Analysis
-
max time kernel
140s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 07:05
Static task
static1
Behavioral task
behavioral1
Sample
7995c5a0129f58f87826d40dce0e7bcf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7995c5a0129f58f87826d40dce0e7bcf.exe
Resource
win10v2004-20231222-en
General
-
Target
7995c5a0129f58f87826d40dce0e7bcf.exe
-
Size
200KB
-
MD5
7995c5a0129f58f87826d40dce0e7bcf
-
SHA1
669d2e136a23adf09d2d42904bda5dcee19af16e
-
SHA256
44b958aa74e6cdd849438ff04956a94305dd611ef06353edc83f2b34f94a16e1
-
SHA512
3975a8a9726388b02833855b2974f6c22b32213e4437f60122b3f89c364e9da37d6c3ec5c955d777f5d955df1749c061f1bd8cddef58285590dec280f0947d3a
-
SSDEEP
6144:TlLq/I+mO31DBybYdTJgr9OuZjOVce3BHdmzG3W:xLqbN33RJgnRgVH4zGm
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2780 ehb.exe -
Executes dropped EXE 1 IoCs
pid Process 2780 ehb.exe -
Loads dropped DLL 2 IoCs
pid Process 2316 7995c5a0129f58f87826d40dce0e7bcf.exe 2316 7995c5a0129f58f87826d40dce0e7bcf.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\start ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\open\command ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\runas ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\DefaultIcon\ = "%1" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ehb.exe\" -a \"%1\" %*" ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\ = "Application" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\DefaultIcon ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\start\command ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\Content Type = "application/x-msdownload" ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\runas\command ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\open ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" ehb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" ehb.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\DefaultIcon ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\open ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\open\command ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\runas ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\DefaultIcon ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\open ehb.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\Content Type = "application/x-msdownload" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\ = "Application" ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\DefaultIcon\ = "%1" ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ehb.exe\" -a \"%1\" %*" ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\ = "exefile" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\start ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\start\command ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\Content Type = "application/x-msdownload" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\open\command ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\runas\command ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\start ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\runas ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\ehb.exe\" -a \"%1\" %*" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\runas\command ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" ehb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\DefaultIcon\ = "%1" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" ehb.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\exefile\shell\start\command ehb.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2316 7995c5a0129f58f87826d40dce0e7bcf.exe 2316 7995c5a0129f58f87826d40dce0e7bcf.exe 2316 7995c5a0129f58f87826d40dce0e7bcf.exe 2316 7995c5a0129f58f87826d40dce0e7bcf.exe 2316 7995c5a0129f58f87826d40dce0e7bcf.exe 2316 7995c5a0129f58f87826d40dce0e7bcf.exe 2316 7995c5a0129f58f87826d40dce0e7bcf.exe 2316 7995c5a0129f58f87826d40dce0e7bcf.exe 2316 7995c5a0129f58f87826d40dce0e7bcf.exe 2780 ehb.exe 2780 ehb.exe 2780 ehb.exe 2780 ehb.exe 2780 ehb.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2748 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe Token: SeShutdownPrivilege 2748 explorer.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2780 ehb.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2780 ehb.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2748 explorer.exe 2780 ehb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2780 2316 7995c5a0129f58f87826d40dce0e7bcf.exe 28 PID 2316 wrote to memory of 2780 2316 7995c5a0129f58f87826d40dce0e7bcf.exe 28 PID 2316 wrote to memory of 2780 2316 7995c5a0129f58f87826d40dce0e7bcf.exe 28 PID 2316 wrote to memory of 2780 2316 7995c5a0129f58f87826d40dce0e7bcf.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7995c5a0129f58f87826d40dce0e7bcf.exe"C:\Users\Admin\AppData\Local\Temp\7995c5a0129f58f87826d40dce0e7bcf.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\ehb.exe"C:\Users\Admin\AppData\Local\ehb.exe" -gav C:\Users\Admin\AppData\Local\Temp\7995c5a0129f58f87826d40dce0e7bcf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2780
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2748
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD58a1f7fe08eb09f64980661870438374e
SHA177f437bae9b12192bf7424135b16e4c1a0502fb1
SHA2565668b980df547ce5c7948e676acd59431e5924cbf28175996272e5599c3dd479
SHA51235b18587832c4cda36dbe1d02952c6ec224e1f36a138abeeda52be2621788739f607fa5c8ab36ae3e85204100e435392d0b930d07f267b4d374366cbb832de11