Analysis
-
max time kernel
163s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
790bdfac79d185982d122d9e543afd74.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
790bdfac79d185982d122d9e543afd74.exe
Resource
win10v2004-20231215-en
General
-
Target
790bdfac79d185982d122d9e543afd74.exe
-
Size
587KB
-
MD5
790bdfac79d185982d122d9e543afd74
-
SHA1
2f70d0b4be975636fbfdbf897983f9f4fb463e6e
-
SHA256
383f295f0b57718cbd0c99865fe5b27c9f926a486cf04f67f781746bfc2ae71c
-
SHA512
1a1c49ff7b7a76ca7f18fd7e5eed0ed4d9114ff3347a50fac5b3723c4916b1cc8fcd21f7e0e723eeb6b3733abcd106c7a265a2d3deaa1422ae1f85fc6127879b
-
SSDEEP
12288:umqaR/QvkuaXUmZl1r8IfeCNBT5JYF3Z4mxxEoEtlK+kt9T2MBf:umh4/6RfeUfJYQmX9G8f
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2920 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1084 Windows Aues -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Windows Aues 790bdfac79d185982d122d9e543afd74.exe File created C:\Windows\Delete.bat 790bdfac79d185982d122d9e543afd74.exe File created C:\Windows\Windows Aues 790bdfac79d185982d122d9e543afd74.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control Windows Aues Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm Windows Aues Set value (int) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm\wheel = "1" Windows Aues Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm Windows Aues Key created \REGISTRY\USER\.DEFAULT\System Windows Aues Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet Windows Aues Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties Windows Aues Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties Windows Aues Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick Windows Aues -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1084 Windows Aues -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1084 wrote to memory of 2924 1084 Windows Aues 30 PID 1084 wrote to memory of 2924 1084 Windows Aues 30 PID 1084 wrote to memory of 2924 1084 Windows Aues 30 PID 1084 wrote to memory of 2924 1084 Windows Aues 30 PID 2840 wrote to memory of 2920 2840 790bdfac79d185982d122d9e543afd74.exe 29 PID 2840 wrote to memory of 2920 2840 790bdfac79d185982d122d9e543afd74.exe 29 PID 2840 wrote to memory of 2920 2840 790bdfac79d185982d122d9e543afd74.exe 29 PID 2840 wrote to memory of 2920 2840 790bdfac79d185982d122d9e543afd74.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\790bdfac79d185982d122d9e543afd74.exe"C:\Users\Admin\AppData\Local\Temp\790bdfac79d185982d122d9e543afd74.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Delete.bat2⤵
- Deletes itself
PID:2920
-
-
C:\Windows\Windows Aues"C:\Windows\Windows Aues"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2924
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186B
MD57063e659f81f12b0e14c044b4cd7cd1d
SHA19d0618b1ef1b4a138fa0324e578bab126e4e8169
SHA256956f31ddae69077199250610599ff7e77ef9d142e8bfcba83f0a50c0e43b0a65
SHA512a7873ff04a2a36d0763801e19aa40abd64b790a0ce9127a34669631ebe9f8654aff45fa738bfd32af78cd7df3f8ac815c2f3c1a042cdfe05ae532fb1835d6304
-
Filesize
96KB
MD51270dd0b4df0219ae256026cea0a4b73
SHA14d7374c9a3610b4debd723bbbcd0741605ac5289
SHA256d61a919b1e199f7682f8d64f7dd5e26488e6356380d9cea1aa337676779f24c5
SHA512288d56aecc5b8494b7c3f088aeec4ca35e1a79b8f7cb24a959c79e574c374faed812e7379225fb3f39443a2e6b4b7825fe6f724999d4a39b3c6b0d22ca1b6437
-
Filesize
247KB
MD5d8850e2b57cb2a1683016ff8453c0d96
SHA11d1953bd9aed9d776be2d222adea58084c42789f
SHA256d297556d8b10aedb21cdff0596af04c3ac5619f8e51c23f1c8bb43940d19b12a
SHA512e0ac7051e78ca3416244b1d1e02309a8970432a4e3342ec0ce6a44be0e04d604cb01db4915c097446d3fbbc36728dc89ffabd28b97777b528e64cbe550c50707