Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 00:58
Static task
static1
Behavioral task
behavioral1
Sample
75f7bea211000e2ceb493707b3fe39eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75f7bea211000e2ceb493707b3fe39eb.exe
Resource
win10v2004-20231215-en
General
-
Target
75f7bea211000e2ceb493707b3fe39eb.exe
-
Size
166KB
-
MD5
75f7bea211000e2ceb493707b3fe39eb
-
SHA1
a1468d137351b3241c7fa79d601c732a8f29bcc4
-
SHA256
2f10752172c62b567158e7877923d22f0d89ffc3c1897b62f344be588a266a0c
-
SHA512
4603eccf76a6d9f96217debda2cc2b299f373ece9be7e3ff61f66e4b5c7edd8c4f6f50e8b67d9439a34abcbe52b5688bfc845d5a43550e09e115425639e8afb5
-
SSDEEP
3072:t4TBeNXm+ApSHXaa3C6uji+LDssZDdWGH8cowPiTpgXqVEqOy:t8BexApSHXaa3C6u2v0dWGH8cowPRamq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2144 Hbogya.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 75f7bea211000e2ceb493707b3fe39eb.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 75f7bea211000e2ceb493707b3fe39eb.exe File created C:\Windows\Hbogya.exe 75f7bea211000e2ceb493707b3fe39eb.exe File opened for modification C:\Windows\Hbogya.exe 75f7bea211000e2ceb493707b3fe39eb.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Hbogya.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job Hbogya.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main Hbogya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe 2144 Hbogya.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1308 75f7bea211000e2ceb493707b3fe39eb.exe Token: SeBackupPrivilege 1308 75f7bea211000e2ceb493707b3fe39eb.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1308 wrote to memory of 2144 1308 75f7bea211000e2ceb493707b3fe39eb.exe 28 PID 1308 wrote to memory of 2144 1308 75f7bea211000e2ceb493707b3fe39eb.exe 28 PID 1308 wrote to memory of 2144 1308 75f7bea211000e2ceb493707b3fe39eb.exe 28 PID 1308 wrote to memory of 2144 1308 75f7bea211000e2ceb493707b3fe39eb.exe 28 PID 1308 wrote to memory of 2144 1308 75f7bea211000e2ceb493707b3fe39eb.exe 28 PID 1308 wrote to memory of 2144 1308 75f7bea211000e2ceb493707b3fe39eb.exe 28 PID 1308 wrote to memory of 2144 1308 75f7bea211000e2ceb493707b3fe39eb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\75f7bea211000e2ceb493707b3fe39eb.exe"C:\Users\Admin\AppData\Local\Temp\75f7bea211000e2ceb493707b3fe39eb.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\Hbogya.exeC:\Windows\Hbogya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD575f7bea211000e2ceb493707b3fe39eb
SHA1a1468d137351b3241c7fa79d601c732a8f29bcc4
SHA2562f10752172c62b567158e7877923d22f0d89ffc3c1897b62f344be588a266a0c
SHA5124603eccf76a6d9f96217debda2cc2b299f373ece9be7e3ff61f66e4b5c7edd8c4f6f50e8b67d9439a34abcbe52b5688bfc845d5a43550e09e115425639e8afb5
-
Filesize
344B
MD5297291f4545f6a6ef30706bf9e4848dc
SHA170777658cfabc15a261a446e8ba73a532f65f01a
SHA2563871590158c5bc16fd764e9a9202ea28be02119f2075e380f0924d06bf06b669
SHA512f17deb06a8bf9694299ed5774402f569ef467f9677d070e6cefc7554951f73b10f67965e71ac150c5afa0dc1dc8667fb958d0defde6638a2daba106a98f48d60