Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:36
Behavioral task
behavioral1
Sample
751c3019e0e58df216b3aa22972d101b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
751c3019e0e58df216b3aa22972d101b.exe
Resource
win10v2004-20231215-en
General
-
Target
751c3019e0e58df216b3aa22972d101b.exe
-
Size
42KB
-
MD5
751c3019e0e58df216b3aa22972d101b
-
SHA1
b61ca1a4c5b4810c18252caa9970d85e1f88830b
-
SHA256
8786fe2c7ac85446839e15b87a0903db034c9a74a570d4cb79a87e9ef97cec77
-
SHA512
0a256725f7d10056e00aa8e9ff07b7b19ea20be7f954a99cffcbb2ff3280e6eb3f1c0c229ccb6ee5609898286d440f22edc0ef8bbf5a6b73519d26100452371c
-
SSDEEP
768:5DeMjCBkY+norh4dH5fMK8zSvSngYzubT5kI6xBcsXpzmjtN5:5i9KY7i538+vaubT5YBcemJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
internet.exepid Process 2348 internet.exe -
Processes:
resource yara_rule behavioral2/memory/4952-0-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/files/0x00060000000231f9-3.dat upx behavioral2/memory/4952-6-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/2348-7-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/4952-10-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
internet.exe751c3019e0e58df216b3aa22972d101b.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\Windows Update = "internet.exe" internet.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "internet.exe" internet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\Windows Update = "internet.exe" 751c3019e0e58df216b3aa22972d101b.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "internet.exe" 751c3019e0e58df216b3aa22972d101b.exe -
Drops file in System32 directory 1 IoCs
Processes:
751c3019e0e58df216b3aa22972d101b.exedescription ioc Process File created C:\Windows\SysWOW64\internet.exe 751c3019e0e58df216b3aa22972d101b.exe -
Drops file in Windows directory 2 IoCs
Processes:
751c3019e0e58df216b3aa22972d101b.exedescription ioc Process File created C:\Windows\SysExplr.exe 751c3019e0e58df216b3aa22972d101b.exe File opened for modification C:\Windows\SysExplr.exe 751c3019e0e58df216b3aa22972d101b.exe -
Modifies registry class 4 IoCs
Processes:
751c3019e0e58df216b3aa22972d101b.exeinternet.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command 751c3019e0e58df216b3aa22972d101b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysExplr.exe \"%1\" " 751c3019e0e58df216b3aa22972d101b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command internet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "C:\\Windows\\SysExplr.exe \"%1\" " internet.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
751c3019e0e58df216b3aa22972d101b.exedescription pid Process procid_target PID 4952 wrote to memory of 2348 4952 751c3019e0e58df216b3aa22972d101b.exe 85 PID 4952 wrote to memory of 2348 4952 751c3019e0e58df216b3aa22972d101b.exe 85 PID 4952 wrote to memory of 2348 4952 751c3019e0e58df216b3aa22972d101b.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\751c3019e0e58df216b3aa22972d101b.exe"C:\Users\Admin\AppData\Local\Temp\751c3019e0e58df216b3aa22972d101b.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\internet.exeC:\Windows\system32\internet.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5751c3019e0e58df216b3aa22972d101b
SHA1b61ca1a4c5b4810c18252caa9970d85e1f88830b
SHA2568786fe2c7ac85446839e15b87a0903db034c9a74a570d4cb79a87e9ef97cec77
SHA5120a256725f7d10056e00aa8e9ff07b7b19ea20be7f954a99cffcbb2ff3280e6eb3f1c0c229ccb6ee5609898286d440f22edc0ef8bbf5a6b73519d26100452371c