Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 20:15
Static task
static1
Behavioral task
behavioral1
Sample
7b2ce87f1e273554167507e85d99a6db.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b2ce87f1e273554167507e85d99a6db.exe
Resource
win10v2004-20231215-en
General
-
Target
7b2ce87f1e273554167507e85d99a6db.exe
-
Size
9.1MB
-
MD5
7b2ce87f1e273554167507e85d99a6db
-
SHA1
85766173ffbbc5abe4b07020b12c14f90713744e
-
SHA256
9dee561d6e9fd7a07df10be0b4715ce7f2ee8f9e2ff7ceafd8bc65d2056880d7
-
SHA512
44c145bbf0af948e644ee2dc3dfaaddf7eb1b03898bc353980f5229491afd8cb1875694d75a85ce177c0fc4325d2397a20bcac501ad2f9eb7b2dbe20cc0c92b7
-
SSDEEP
49152:EQFRHrmQG+yrV29jMrmQG+yrV29FQFR229jM529FQFR229jjMrmQG+yrV29FQFRT:EcKEycLcRycT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2804 z.exe -
Loads dropped DLL 2 IoCs
pid Process 2228 7b2ce87f1e273554167507e85d99a6db.exe 2228 7b2ce87f1e273554167507e85d99a6db.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main z.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 z.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2804 z.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2804 z.exe 2804 z.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2804 2228 7b2ce87f1e273554167507e85d99a6db.exe 28 PID 2228 wrote to memory of 2804 2228 7b2ce87f1e273554167507e85d99a6db.exe 28 PID 2228 wrote to memory of 2804 2228 7b2ce87f1e273554167507e85d99a6db.exe 28 PID 2228 wrote to memory of 2804 2228 7b2ce87f1e273554167507e85d99a6db.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b2ce87f1e273554167507e85d99a6db.exe"C:\Users\Admin\AppData\Local\Temp\7b2ce87f1e273554167507e85d99a6db.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\z.exeC:\Users\Admin\AppData\Local\Temp\z.exe -run C:\Users\Admin\AppData\Local\Temp\7b2ce87f1e273554167507e85d99a6db.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD526d370c42afec2663b702b94e350de90
SHA16cab1ab73d1b11989033d2910780b392608af79f
SHA256a4139cf0a50a307e8a9e93949a40b2b203c984ca332071b0d369ff27634eb8b7
SHA512f027b63752d7e1f389b14c757d452781d0dc2d462b3195bda91fc06302d7d22d76c994d797e25c2ee4dbfdc066146d05d0501ffa88d62f8b9333d6f5e635469d
-
Filesize
52KB
MD545a5885538b870b235bfebb8b9a9ea8b
SHA12cb4db9d40a6e1966cb1865815600122865ec502
SHA256817816c136950c38cbac38c4ab3d81adab23fca39487c6b4a54fa99a8d8bc404
SHA512a6ff2347c4da3900a56891f9e82216ea7d8c9b83b42dce8c4933f054631a46227257c054866cb9d9cf3c7a7cccc8e35958447403e308a8c87dbd2eabe203734c
-
Filesize
1.5MB
MD5e036278de44997aef5f29271482a98c2
SHA121f9513efa768b7747f975c80c6e46fe89bea4d5
SHA2561c96c6f7496b8bff3350b67607d55086f5cd0debcec89870ff10a8139ed87cdf
SHA5125a520c9973837699d2576e621e48a9f96a8cb2360c6ad1490c3e121143beb968098a98774f13d923d32754b5ab7fc35351b77261541f6bffe73672481df08b14
-
Filesize
74KB
MD507dd46d930aa123fca7767d89f607de4
SHA1d5ab023eeb170607e5bc3de8ea039f96169cbe8e
SHA2562510d4835fadc896b493c3ffe14ff5aa8587f38a93e18b1038b227c7cce62bb5
SHA5128309ef92db76892548d9d78d7235318c8f3534d6b9482f920ca5e6f57eac9f93e81da69134ac970d7f8bf61a613d7ce78078f6c47aad45a1a67bb42be39d95bc
-
Filesize
1.6MB
MD5351922753f96cdb48d8dfc3fa51332a5
SHA1c1a45196112a2c7262f178b0860adf3c1968e01e
SHA256b0d56e8952f1a9a43089504730f31b7a240507a681126b51dba0d054c20a9bb5
SHA512712c1e7cfd9911c9d16708fea2ce540da6f4e1e26ae62feb2ed497bbc726ad65b83715f0608ab0d154b55ecff286bd0577d1b6f612fa6f6b62665b097330ec1a