Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
861cd4c3b9f997068894ece373da3142.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
861cd4c3b9f997068894ece373da3142.exe
Resource
win10v2004-20231222-en
General
-
Target
861cd4c3b9f997068894ece373da3142.exe
-
Size
43KB
-
MD5
861cd4c3b9f997068894ece373da3142
-
SHA1
8966ca21604e4ab85c759d43b9593be763045dcf
-
SHA256
5968a3f22d3c359b23c1405f50a5af72ef74cc6261c94b7d42ae4348a2a1f73e
-
SHA512
9e563639eb80b96cbdfdc65c786d92d6d36b3aed22ef4df309122b71d49bb785de2705f82554fe8145a8dcc8e06a364b548c814c52f6a6de7c1c937113a9c938
-
SSDEEP
768:/r307KD+sUJdb4FSk5nSxv3Ps+ri+fXSK2vtNeFkI+eM5z97D:/rb+sUJB4fnSNsii+fsNokf77D
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\MIME\Database 861cd4c3b9f997068894ece373da3142.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Charset 861cd4c3b9f997068894ece373da3142.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Codepage 861cd4c3b9f997068894ece373da3142.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings 861cd4c3b9f997068894ece373da3142.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\100567~1.JPG:Zone.Identifier 861cd4c3b9f997068894ece373da3142.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2220 861cd4c3b9f997068894ece373da3142.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2220 861cd4c3b9f997068894ece373da3142.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2220 wrote to memory of 972 2220 861cd4c3b9f997068894ece373da3142.exe 87 PID 2220 wrote to memory of 972 2220 861cd4c3b9f997068894ece373da3142.exe 87 PID 2220 wrote to memory of 972 2220 861cd4c3b9f997068894ece373da3142.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\861cd4c3b9f997068894ece373da3142.exe"C:\Users\Admin\AppData\Local\Temp\861cd4c3b9f997068894ece373da3142.exe"1⤵
- Modifies registry class
- NTFS ADS
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {25336920-03F9-11CF-8FD0-00AA00686F13} /I {00000112-0000-0000-C000-000000000046} /X 0x52⤵PID:972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5b33e806a7d4b84a476584a23fb3d0047
SHA1ec59f1da83bfdaa8485f9c15388661390e7b65f8
SHA2560832325668ec334b3f72f4d707d922b1f4ab3231b661309e882370c0b63ebadd
SHA512d85ad73d880c0c4b6774f73849f2b13335542503c86d61ecf239f2e4d26e77230af9c7b9f1611e7c273d224d2030b8e2e97f16e2cb231772e97356f9c7522f2a