Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 02:05
Static task
static1
Behavioral task
behavioral1
Sample
73732658650643a02049bd439e649d23.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
73732658650643a02049bd439e649d23.exe
Resource
win10v2004-20231222-en
General
-
Target
73732658650643a02049bd439e649d23.exe
-
Size
6.2MB
-
MD5
73732658650643a02049bd439e649d23
-
SHA1
0053e7fd273f2e4c12dac95eedffa0f79a36b052
-
SHA256
96ec2b2507de0bd5269ed6336214982170a1cace9e0ff1607b6aeb4fb5e8fe1b
-
SHA512
d84d7469dc854146b7833d2e87919286062b6e41fbad5d269fdef278b943be496bc07f805be02f8d08037c08b579c0ebd8bd04d285fd10060272c2212e90e277
-
SSDEEP
98304:XHqPmH+R2r4fFtmocc/v21KsSXLzOh69CBkvZcUf1aphMoRdKuIXBbvCwc:3qOeRrQlc/AV6uh69CBhQ1ghVRd8lCN
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2752 73732658650643a02049bd439e649d23.exe 2752 73732658650643a02049bd439e649d23.exe 2752 73732658650643a02049bd439e649d23.exe 2752 73732658650643a02049bd439e649d23.exe 2752 73732658650643a02049bd439e649d23.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Startup = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\73732658650643a02049bd439e649d23.exe" 73732658650643a02049bd439e649d23.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 73732658650643a02049bd439e649d23.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 73732658650643a02049bd439e649d23.exe -
Modifies registry class 25 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff 73732658650643a02049bd439e649d23.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags 73732658650643a02049bd439e649d23.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4a003100000000003958aa10102054656d700000360008000400efbe7d5746883958aa102a000000ff010000000002000000000000000000000000000000540065006d007000000014000000 73732658650643a02049bd439e649d23.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 73732658650643a02049bd439e649d23.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff 73732658650643a02049bd439e649d23.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell 73732658650643a02049bd439e649d23.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 73732658650643a02049bd439e649d23.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" 73732658650643a02049bd439e649d23.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 73732658650643a02049bd439e649d23.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" 73732658650643a02049bd439e649d23.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 4c003100000000007d57db8b10204c6f63616c00380008000400efbe7d5746887d57db8b2a000000fe0100000000020000000000000000000000000000004c006f00630061006c00000014000000 73732658650643a02049bd439e649d23.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 73732658650643a02049bd439e649d23.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 73732658650643a02049bd439e649d23.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 73732658650643a02049bd439e649d23.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff 73732658650643a02049bd439e649d23.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_Classes\Local Settings 73732658650643a02049bd439e649d23.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU 73732658650643a02049bd439e649d23.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 73732658650643a02049bd439e649d23.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff 73732658650643a02049bd439e649d23.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell 73732658650643a02049bd439e649d23.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots 73732658650643a02049bd439e649d23.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff 73732658650643a02049bd439e649d23.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 7e0074001c004346534616003100000000007d574688122041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f3c0008000400efbe7d5746887d5746882a000000eb0100000000020000000000000000000000000000004100700070004400610074006100000042000000 73732658650643a02049bd439e649d23.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff 73732658650643a02049bd439e649d23.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" 73732658650643a02049bd439e649d23.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2752 73732658650643a02049bd439e649d23.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: 33 2752 73732658650643a02049bd439e649d23.exe Token: SeIncBasePriorityPrivilege 2752 73732658650643a02049bd439e649d23.exe Token: 33 2752 73732658650643a02049bd439e649d23.exe Token: SeIncBasePriorityPrivilege 2752 73732658650643a02049bd439e649d23.exe Token: 33 2752 73732658650643a02049bd439e649d23.exe Token: SeIncBasePriorityPrivilege 2752 73732658650643a02049bd439e649d23.exe Token: 33 2752 73732658650643a02049bd439e649d23.exe Token: SeIncBasePriorityPrivilege 2752 73732658650643a02049bd439e649d23.exe Token: 33 2752 73732658650643a02049bd439e649d23.exe Token: SeIncBasePriorityPrivilege 2752 73732658650643a02049bd439e649d23.exe Token: 33 2752 73732658650643a02049bd439e649d23.exe Token: SeIncBasePriorityPrivilege 2752 73732658650643a02049bd439e649d23.exe Token: 33 2752 73732658650643a02049bd439e649d23.exe Token: SeIncBasePriorityPrivilege 2752 73732658650643a02049bd439e649d23.exe Token: 33 2752 73732658650643a02049bd439e649d23.exe Token: SeIncBasePriorityPrivilege 2752 73732658650643a02049bd439e649d23.exe Token: 33 2752 73732658650643a02049bd439e649d23.exe Token: SeIncBasePriorityPrivilege 2752 73732658650643a02049bd439e649d23.exe Token: 33 2752 73732658650643a02049bd439e649d23.exe Token: SeIncBasePriorityPrivilege 2752 73732658650643a02049bd439e649d23.exe Token: 33 2752 73732658650643a02049bd439e649d23.exe Token: SeIncBasePriorityPrivilege 2752 73732658650643a02049bd439e649d23.exe Token: 33 2752 73732658650643a02049bd439e649d23.exe Token: SeIncBasePriorityPrivilege 2752 73732658650643a02049bd439e649d23.exe Token: 33 2752 73732658650643a02049bd439e649d23.exe Token: SeIncBasePriorityPrivilege 2752 73732658650643a02049bd439e649d23.exe Token: 33 2752 73732658650643a02049bd439e649d23.exe Token: SeIncBasePriorityPrivilege 2752 73732658650643a02049bd439e649d23.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2752 73732658650643a02049bd439e649d23.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2752 73732658650643a02049bd439e649d23.exe 2752 73732658650643a02049bd439e649d23.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73732658650643a02049bd439e649d23.exe"C:\Users\Admin\AppData\Local\Temp\73732658650643a02049bd439e649d23.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD59eda6ac05d976773bec1a5ac2fc19c3b
SHA15885ea8e22e1d85b30e5e899c2f803c0212edccc
SHA25647cc32f966ed28e1bd719faa6ce6d2919c4d447ef784b866155796ebb410ae0a
SHA51221401d8c5336832d3603e596564065e20f178ec8cf5a983b232cdea97f1b5b55a6d3cfe141262e3680aa2caae8bcf9ec41d1db07e3d3edc243a7c308461975a9
-
Filesize
192KB
MD5df9ffe8b2b937c3316bbead7821bee5d
SHA14d6cb8554e3f9f243a775e9f9b5e107e31ebe571
SHA2564e760b339619cad772323203f2c9b4adc0c1e9b335f657afa0cb4087a036c42b
SHA5121e1cd1cbf337557333e341459f80a28cbd68e8452fca3ea844726afd19463404bb60760b1b1e8dfb881bfa8bfed6fdc77b1c31a55b8f9f63dfb9d7ad9de704fd
-
Filesize
132KB
MD53a9fff286cf967cfd251324c83bf4921
SHA1e0c90a51520ef36803469f3de79039db01cf49b9
SHA256bed9643898f91e7bcc4d551ceff435c02d71867cc5a950b0de53489e26cb2155
SHA512e772539f8f830d89797bd187dc07f1a66aea5aebcb7e8e2c569c8d53bcd19bb7deaf95c059c49c4d71dde8fdea07f0108e954b4cd966635881dc3e47bc62f4f0
-
Filesize
407KB
MD5f8aa1f66f236ef14c1fcfd65e8558686
SHA1e2f8958e6105013cb950b6223696c3aa3cb26092
SHA2568630003c16ad1770d12cb4b8e72b14953923b387991eff97426ff87a4bbca73b
SHA512ad40fe0e9925a52c2e8068d756a32551bdf4dea2f3485098b0548b8eaf128fd3c6f2237a5577ca51b0138df3c56975b033177f3d3b30c770364225e0cc6dc90f
-
Filesize
248KB
MD55379c9da4eecad6bd87e16fa9bf77793
SHA14952f040868210db520c15e2c948af48000da6b3
SHA256f0466700070303202910c7e7b740d3a96750b0fa8a5b5b035d789d2815d49029
SHA512a30f6a783377b932bd7c35194c883788ccde2f6040ae261d34aa22d93212a4f8184e9cf39208ddd52db23fb212a89757c1862df02bfc8ee90d61cca517485cde