Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 08:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7ca65c3d621f7093869f212a8a0dfec8.exe
Resource
win7-20231215-en
7 signatures
150 seconds
General
-
Target
7ca65c3d621f7093869f212a8a0dfec8.exe
-
Size
86KB
-
MD5
7ca65c3d621f7093869f212a8a0dfec8
-
SHA1
c5879174e12faed25318c30cfbc4eecf8b76742f
-
SHA256
b9902ca1c98abcc21e9c41e047188965e75bde9f49e86eb79ef6c97e05fd774f
-
SHA512
4c7e004c10bf49f1b55f2daf4ff7d540e313e9b778e49e7d7588ebffbee4f3a8d4254394388668b2e396e41c9cc15a237cac6ea828cdfba8ae3383fb4ccf4f0f
-
SSDEEP
1536:evBQXLzE5u1SLFLMP4gvU9CWhdCvEW3cz8cJHoyf7cBNuHtNMT5dJK:5KQSLFLMP4g8vhd0EW368cZo7vuHtI6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1728 cmd.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{FFFFFFFF-85A3-452b-B7A8-759AD9B42162} 7ca65c3d621f7093869f212a8a0dfec8.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 7ca65c3d621f7093869f212a8a0dfec8.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\swin32.dll 7ca65c3d621f7093869f212a8a0dfec8.exe File created C:\Windows\SysWOW64\ds.dat 7ca65c3d621f7093869f212a8a0dfec8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" 7ca65c3d621f7093869f212a8a0dfec8.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFFFF-85A3-452b-B7A8-759AD9B42162}\InprocServer32\ThreadingModel = "Apartment" 7ca65c3d621f7093869f212a8a0dfec8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFFFF-85A3-452b-B7A8-759AD9B42162}\ProgID 7ca65c3d621f7093869f212a8a0dfec8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFFFF-85A3-452b-B7A8-759AD9B42162}\ProgID\ = "RITLAB.1" 7ca65c3d621f7093869f212a8a0dfec8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFFFF-85A3-452b-B7A8-759AD9B42162}\TypeLib 7ca65c3d621f7093869f212a8a0dfec8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFFFF-85A3-452b-B7A8-759AD9B42162}\TypeLib\ = "{BFF1D9CB-97CB-46bc-AC90-F9FF3AA89131}" 7ca65c3d621f7093869f212a8a0dfec8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFFFF-85A3-452b-B7A8-759AD9B42162} 7ca65c3d621f7093869f212a8a0dfec8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFFFF-85A3-452b-B7A8-759AD9B42162}\ = "Aero skin" 7ca65c3d621f7093869f212a8a0dfec8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFFFF-85A3-452b-B7A8-759AD9B42162}\InprocServer32 7ca65c3d621f7093869f212a8a0dfec8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FFFFFFFF-85A3-452b-B7A8-759AD9B42162}\InprocServer32\ = "swin32.dll" 7ca65c3d621f7093869f212a8a0dfec8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1728 2072 7ca65c3d621f7093869f212a8a0dfec8.exe 28 PID 2072 wrote to memory of 1728 2072 7ca65c3d621f7093869f212a8a0dfec8.exe 28 PID 2072 wrote to memory of 1728 2072 7ca65c3d621f7093869f212a8a0dfec8.exe 28 PID 2072 wrote to memory of 1728 2072 7ca65c3d621f7093869f212a8a0dfec8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ca65c3d621f7093869f212a8a0dfec8.exe"C:\Users\Admin\AppData\Local\Temp\7ca65c3d621f7093869f212a8a0dfec8.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\7CA65C~1.EXE >> NUL2⤵
- Deletes itself
PID:1728
-