Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 16:40
Behavioral task
behavioral1
Sample
74fdf276251087de9542c2da90ed9b59.exe
Resource
win7-20231215-en
General
-
Target
74fdf276251087de9542c2da90ed9b59.exe
-
Size
1.0MB
-
MD5
74fdf276251087de9542c2da90ed9b59
-
SHA1
750c4be9b74c0ff9ee612ebc8a0567deee7f431f
-
SHA256
2412815db6cbeeef60d7309a065b6d0bd8eec84f97f87d419147cde21c91bff2
-
SHA512
14497f2699d17ed7f36c3341f90eadc9b0ea354d68bc8c096911110c08fb7ecdf9d12f5e56a8b4278ed4379c72f853f0bbc14fc649c9c0365c32627995f6babc
-
SSDEEP
24576:xfLHuzBsBX4BF3LEV8dz/WqBEJBFeYns+HAeyfLGfgyMy/cF:xfj0wk9L80z/LEJBFeJ+HZEGTw
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2108-0-0x00000000010D0000-0x0000000001316000-memory.dmp upx behavioral1/memory/2108-20-0x00000000010D0000-0x0000000001316000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main 74fdf276251087de9542c2da90ed9b59.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 74fdf276251087de9542c2da90ed9b59.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 74fdf276251087de9542c2da90ed9b59.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 74fdf276251087de9542c2da90ed9b59.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2108 74fdf276251087de9542c2da90ed9b59.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2108 74fdf276251087de9542c2da90ed9b59.exe 2108 74fdf276251087de9542c2da90ed9b59.exe 2108 74fdf276251087de9542c2da90ed9b59.exe 2108 74fdf276251087de9542c2da90ed9b59.exe 2108 74fdf276251087de9542c2da90ed9b59.exe 2108 74fdf276251087de9542c2da90ed9b59.exe 2108 74fdf276251087de9542c2da90ed9b59.exe 2108 74fdf276251087de9542c2da90ed9b59.exe 2108 74fdf276251087de9542c2da90ed9b59.exe 2108 74fdf276251087de9542c2da90ed9b59.exe 2108 74fdf276251087de9542c2da90ed9b59.exe 2108 74fdf276251087de9542c2da90ed9b59.exe 2108 74fdf276251087de9542c2da90ed9b59.exe 2108 74fdf276251087de9542c2da90ed9b59.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74fdf276251087de9542c2da90ed9b59.exe"C:\Users\Admin\AppData\Local\Temp\74fdf276251087de9542c2da90ed9b59.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD56eb05dd8dac412dde3c7c4c77fa795c2
SHA14a394aed261ac257c6def15e3b199bbdef869c4d
SHA25614bac8532e27adf9f8a0645e953b6dbddbeffe0836de6ee53bedb4d6c3a8799e
SHA512558e994205bd1a96c74d116e79f474b6ffd44f29545276fa122275d4c6c0bc24706e842ea6ebe729fcfd44a9fe5c01a3984dc75d94fddde8678520605395fc50