Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 22:37
Behavioral task
behavioral1
Sample
73077ca0726b451d2ccd933749a2ad1f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
73077ca0726b451d2ccd933749a2ad1f.exe
Resource
win10v2004-20231222-en
General
-
Target
73077ca0726b451d2ccd933749a2ad1f.exe
-
Size
806KB
-
MD5
73077ca0726b451d2ccd933749a2ad1f
-
SHA1
c2e916294feee1d0658d0e245f70c19283f8681d
-
SHA256
111274933a113f395ee418bcc37d31ba3a5be706a72e505bac5a1a1775ad1281
-
SHA512
e6c26b63a5336745eeed68ea590bf77a30510f938e8fdaa3c1d9757b347c6640624e2730b9feaffbb894747eaa51d6dbbadb6e7c1f8df8e0218da64881facfbe
-
SSDEEP
24576:n46ozCP4l3cXdcD5O4+UU59oKHd0g4MtBTN/xb:n8WoedQ54UUHo80mZd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1372 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 2252 73077ca0726b451d2ccd933749a2ad1f.exe -
resource yara_rule behavioral1/memory/2252-0-0x0000000000980000-0x0000000000BDE000-memory.dmp upx behavioral1/memory/2252-4-0x00000000026A0000-0x00000000028FE000-memory.dmp upx behavioral1/files/0x000c00000001492c-2.dat upx behavioral1/memory/2252-8-0x0000000000980000-0x0000000000BDE000-memory.dmp upx behavioral1/memory/1372-9-0x0000000001220000-0x000000000147E000-memory.dmp upx behavioral1/memory/1372-29-0x0000000001220000-0x000000000147E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" setup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1372 setup.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1372 setup.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2252 73077ca0726b451d2ccd933749a2ad1f.exe 2252 73077ca0726b451d2ccd933749a2ad1f.exe 1372 setup.exe 1372 setup.exe 1372 setup.exe 1372 setup.exe 1372 setup.exe 1372 setup.exe 1372 setup.exe 1372 setup.exe 1372 setup.exe 1372 setup.exe 1372 setup.exe 1372 setup.exe 1372 setup.exe 1372 setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1372 2252 73077ca0726b451d2ccd933749a2ad1f.exe 28 PID 2252 wrote to memory of 1372 2252 73077ca0726b451d2ccd933749a2ad1f.exe 28 PID 2252 wrote to memory of 1372 2252 73077ca0726b451d2ccd933749a2ad1f.exe 28 PID 2252 wrote to memory of 1372 2252 73077ca0726b451d2ccd933749a2ad1f.exe 28 PID 2252 wrote to memory of 1372 2252 73077ca0726b451d2ccd933749a2ad1f.exe 28 PID 2252 wrote to memory of 1372 2252 73077ca0726b451d2ccd933749a2ad1f.exe 28 PID 2252 wrote to memory of 1372 2252 73077ca0726b451d2ccd933749a2ad1f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\73077ca0726b451d2ccd933749a2ad1f.exe"C:\Users\Admin\AppData\Local\Temp\73077ca0726b451d2ccd933749a2ad1f.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD560995d04e55f8d138cf5183e95942906
SHA1d90f51dd6705b94d7d3915dad623f61a7654a410
SHA25605b3464493d500473e1370aafd8c0b8db1678bd38353237141997607caf5c132
SHA5123886ba8025d96b3ba1522def75b997aec503505c14ec3364bba93fa8a5509c792b44bc67a9afbfcc4af9047bad69ae7c9dfd61ec094079cf7ddf3838704af871
-
Filesize
806KB
MD573077ca0726b451d2ccd933749a2ad1f
SHA1c2e916294feee1d0658d0e245f70c19283f8681d
SHA256111274933a113f395ee418bcc37d31ba3a5be706a72e505bac5a1a1775ad1281
SHA512e6c26b63a5336745eeed68ea590bf77a30510f938e8fdaa3c1d9757b347c6640624e2730b9feaffbb894747eaa51d6dbbadb6e7c1f8df8e0218da64881facfbe