Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-01-2024 21:11
Static task
static1
Behavioral task
behavioral1
Sample
7b49a7999428556c109be5771dce3b2e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b49a7999428556c109be5771dce3b2e.exe
Resource
win10v2004-20231215-en
General
-
Target
7b49a7999428556c109be5771dce3b2e.exe
-
Size
455KB
-
MD5
7b49a7999428556c109be5771dce3b2e
-
SHA1
2b539957e2c9720bfc1f4018448803f0399cb421
-
SHA256
7d01c814e4dc147036470e958c30ec7daa1a2140961e6865d0d6b2db40c66d46
-
SHA512
ab3e7fc465603c98b20a6e8bab8bb9af3c702b2992d24e437ee80b9e6b68fd7775e507df24bf39963368ad55d2f1ff1250b271d93784450ca68e3f238a0b60d6
-
SSDEEP
12288:tPUdz/leuYergLm9AhJ4rhFkpMMnMMMMME0bJvQI6xMdI0+6DtByCVwHM1a:tsN/leuZz8W7kpMMnMMMMME029s+6RwH
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2364 cRdQIGspBdjhpow.exe -
Loads dropped DLL 1 IoCs
pid Process 2224 7b49a7999428556c109be5771dce3b2e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\cRdQIGspBdjhpow = "C:\\ProgramData\\cRdQIGspBdjhpow.exe" 7b49a7999428556c109be5771dce3b2e.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7b49a7999428556c109be5771dce3b2e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 7b49a7999428556c109be5771dce3b2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum cRdQIGspBdjhpow.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 cRdQIGspBdjhpow.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Download 7b49a7999428556c109be5771dce3b2e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 7b49a7999428556c109be5771dce3b2e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2224 7b49a7999428556c109be5771dce3b2e.exe 2224 7b49a7999428556c109be5771dce3b2e.exe 2224 7b49a7999428556c109be5771dce3b2e.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2224 7b49a7999428556c109be5771dce3b2e.exe 2224 7b49a7999428556c109be5771dce3b2e.exe 2364 cRdQIGspBdjhpow.exe 2224 7b49a7999428556c109be5771dce3b2e.exe 2364 cRdQIGspBdjhpow.exe 2224 7b49a7999428556c109be5771dce3b2e.exe 2364 cRdQIGspBdjhpow.exe 2224 7b49a7999428556c109be5771dce3b2e.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe 2364 cRdQIGspBdjhpow.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2224 7b49a7999428556c109be5771dce3b2e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2364 2224 7b49a7999428556c109be5771dce3b2e.exe 28 PID 2224 wrote to memory of 2364 2224 7b49a7999428556c109be5771dce3b2e.exe 28 PID 2224 wrote to memory of 2364 2224 7b49a7999428556c109be5771dce3b2e.exe 28 PID 2224 wrote to memory of 2364 2224 7b49a7999428556c109be5771dce3b2e.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 7b49a7999428556c109be5771dce3b2e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 7b49a7999428556c109be5771dce3b2e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b49a7999428556c109be5771dce3b2e.exe"C:\Users\Admin\AppData\Local\Temp\7b49a7999428556c109be5771dce3b2e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2224 -
C:\ProgramData\cRdQIGspBdjhpow.exe"C:\ProgramData\cRdQIGspBdjhpow.exe"2⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
455KB
MD57b49a7999428556c109be5771dce3b2e
SHA12b539957e2c9720bfc1f4018448803f0399cb421
SHA2567d01c814e4dc147036470e958c30ec7daa1a2140961e6865d0d6b2db40c66d46
SHA512ab3e7fc465603c98b20a6e8bab8bb9af3c702b2992d24e437ee80b9e6b68fd7775e507df24bf39963368ad55d2f1ff1250b271d93784450ca68e3f238a0b60d6