Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 17:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
751dd338d498ac3d0b13442f83582c7b.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
General
-
Target
751dd338d498ac3d0b13442f83582c7b.exe
-
Size
9KB
-
MD5
751dd338d498ac3d0b13442f83582c7b
-
SHA1
9a241fa3b0818360672bfe5088519bcad32ff317
-
SHA256
9b421f4b76f092eeadf3102ff72522707461f79ef9d8165e80933c2502973700
-
SHA512
729b1cef0c5b3513ebbb24a3d353a8fde4a8beb1ddcc2aabfbb02ffc3d73f4b18c47c719a6b18fbf66cfbc55ccc6f4cd6b0db62c36357afd17b5478b79c80fbb
-
SSDEEP
192:dXYeTFEY302wV4YCbtHpROQqvkSSQHimzM3rm9iW9SVvG6uraU9:BFBE8F/RObsxqVQq9iWEvG6o
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 1 IoCs
Processes:
751dd338d498ac3d0b13442f83582c7b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 751dd338d498ac3d0b13442f83582c7b.exe -
Processes:
751dd338d498ac3d0b13442f83582c7b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 751dd338d498ac3d0b13442f83582c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 751dd338d498ac3d0b13442f83582c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 751dd338d498ac3d0b13442f83582c7b.exe -
Processes:
751dd338d498ac3d0b13442f83582c7b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 751dd338d498ac3d0b13442f83582c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 751dd338d498ac3d0b13442f83582c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 751dd338d498ac3d0b13442f83582c7b.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
Processes:
751dd338d498ac3d0b13442f83582c7b.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} 751dd338d498ac3d0b13442f83582c7b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} 751dd338d498ac3d0b13442f83582c7b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} 751dd338d498ac3d0b13442f83582c7b.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 5 IoCs
Processes:
751dd338d498ac3d0b13442f83582c7b.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0\2500 = "3" 751dd338d498ac3d0b13442f83582c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" 751dd338d498ac3d0b13442f83582c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2\2500 = "3" 751dd338d498ac3d0b13442f83582c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\2500 = "3" 751dd338d498ac3d0b13442f83582c7b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4\2500 = "3" 751dd338d498ac3d0b13442f83582c7b.exe -
Processes:
751dd338d498ac3d0b13442f83582c7b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" 751dd338d498ac3d0b13442f83582c7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Search Bar = "http://www.google.com/ie" 751dd338d498ac3d0b13442f83582c7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.google.com" 751dd338d498ac3d0b13442f83582c7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://www.google.com/ie" 751dd338d498ac3d0b13442f83582c7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "http://www.google.com" 751dd338d498ac3d0b13442f83582c7b.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
Processes:
751dd338d498ac3d0b13442f83582c7b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://www.google.com" 751dd338d498ac3d0b13442f83582c7b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.google.com" 751dd338d498ac3d0b13442f83582c7b.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
751dd338d498ac3d0b13442f83582c7b.exepid process 1836 751dd338d498ac3d0b13442f83582c7b.exe 1836 751dd338d498ac3d0b13442f83582c7b.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
751dd338d498ac3d0b13442f83582c7b.exepid process 1836 751dd338d498ac3d0b13442f83582c7b.exe 1836 751dd338d498ac3d0b13442f83582c7b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\751dd338d498ac3d0b13442f83582c7b.exe"C:\Users\Admin\AppData\Local\Temp\751dd338d498ac3d0b13442f83582c7b.exe"1⤵
- Modifies firewall policy service
- Windows security bypass
- Windows security modification
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1836-0-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/1836-1-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/1836-2-0x0000000000220000-0x0000000000222000-memory.dmpFilesize
8KB
-
memory/1836-3-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB
-
memory/1836-4-0x0000000000400000-0x0000000000411000-memory.dmpFilesize
68KB