Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 07:14
Behavioral task
behavioral1
Sample
86447b80427974862f7388efe8675133.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
86447b80427974862f7388efe8675133.exe
Resource
win10v2004-20231215-en
General
-
Target
86447b80427974862f7388efe8675133.exe
-
Size
419KB
-
MD5
86447b80427974862f7388efe8675133
-
SHA1
5a8cbb5771ac82fb0eba1a886ae0357581277f6f
-
SHA256
39b8cc32d4614148aa546ff23f1eec042e916f34b5a8501ffe3364a319fd8fbb
-
SHA512
a6aa76330516f23be1939b6662f6f6b059d45b955ba0756be9daa163ff4b386a2dc3f4587d5a2b62018c12adfe7c10373568ae2bcebcc33c8232561b399d6681
-
SSDEEP
12288:7jtju6APFo38dPbUpLbQJNBWQ4m7ooX1w:rAPq3SbUeXT7oO1
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2860 mplayer2.exe 2880 mplayer2.exe -
Loads dropped DLL 1 IoCs
pid Process 2856 86447b80427974862f7388efe8675133.exe -
resource yara_rule behavioral1/memory/1992-0-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/1992-1-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/1992-9-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/1992-18-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2856-20-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/1992-19-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2856-16-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2856-21-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2860-31-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2856-32-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/files/0x0030000000015c51-30.dat upx behavioral1/files/0x0030000000015c51-28.dat upx behavioral1/files/0x0030000000015c51-25.dat upx behavioral1/memory/2860-33-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/memory/2860-48-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral1/files/0x0030000000015c51-47.dat upx behavioral1/memory/2880-55-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2880-72-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2880-73-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2880-74-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2880-76-0x0000000000400000-0x0000000000437000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmplayer = "c:\\programdata\\messengerplus\\mplayer2.exe" 86447b80427974862f7388efe8675133.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmplayer = "c:\\programdata\\messengerplus\\mplayer2.exe" mplayer2.exe -
AutoIT Executable 8 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1992-1-0x0000000000400000-0x00000000004FE000-memory.dmp autoit_exe behavioral1/memory/1992-9-0x0000000000400000-0x00000000004FE000-memory.dmp autoit_exe behavioral1/memory/1992-18-0x0000000000400000-0x00000000004FE000-memory.dmp autoit_exe behavioral1/memory/1992-19-0x0000000000400000-0x00000000004FE000-memory.dmp autoit_exe behavioral1/memory/2856-29-0x0000000003310000-0x000000000340E000-memory.dmp autoit_exe behavioral1/memory/2860-31-0x0000000000400000-0x00000000004FE000-memory.dmp autoit_exe behavioral1/memory/2860-33-0x0000000000400000-0x00000000004FE000-memory.dmp autoit_exe behavioral1/memory/2860-48-0x0000000000400000-0x00000000004FE000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1992 set thread context of 2856 1992 86447b80427974862f7388efe8675133.exe 28 PID 2860 set thread context of 2880 2860 mplayer2.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" mplayer2.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Download 86447b80427974862f7388efe8675133.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 86447b80427974862f7388efe8675133.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" 86447b80427974862f7388efe8675133.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Download mplayer2.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" mplayer2.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2856 86447b80427974862f7388efe8675133.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe 2880 mplayer2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2856 86447b80427974862f7388efe8675133.exe 2880 mplayer2.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2856 1992 86447b80427974862f7388efe8675133.exe 28 PID 1992 wrote to memory of 2856 1992 86447b80427974862f7388efe8675133.exe 28 PID 1992 wrote to memory of 2856 1992 86447b80427974862f7388efe8675133.exe 28 PID 1992 wrote to memory of 2856 1992 86447b80427974862f7388efe8675133.exe 28 PID 1992 wrote to memory of 2856 1992 86447b80427974862f7388efe8675133.exe 28 PID 1992 wrote to memory of 2856 1992 86447b80427974862f7388efe8675133.exe 28 PID 2856 wrote to memory of 2860 2856 86447b80427974862f7388efe8675133.exe 29 PID 2856 wrote to memory of 2860 2856 86447b80427974862f7388efe8675133.exe 29 PID 2856 wrote to memory of 2860 2856 86447b80427974862f7388efe8675133.exe 29 PID 2856 wrote to memory of 2860 2856 86447b80427974862f7388efe8675133.exe 29 PID 2860 wrote to memory of 2880 2860 mplayer2.exe 32 PID 2860 wrote to memory of 2880 2860 mplayer2.exe 32 PID 2860 wrote to memory of 2880 2860 mplayer2.exe 32 PID 2860 wrote to memory of 2880 2860 mplayer2.exe 32 PID 2860 wrote to memory of 2880 2860 mplayer2.exe 32 PID 2860 wrote to memory of 2880 2860 mplayer2.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\86447b80427974862f7388efe8675133.exe"C:\Users\Admin\AppData\Local\Temp\86447b80427974862f7388efe8675133.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\86447b80427974862f7388efe8675133.exe"C:\Users\Admin\AppData\Local\Temp\86447b80427974862f7388efe8675133.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\programdata\messengerplus\mplayer2.exe"C:\programdata\messengerplus\mplayer2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\programdata\messengerplus\mplayer2.exe"C:\programdata\messengerplus\mplayer2.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249KB
MD53f57dee907e37d568cfa8e132093eecf
SHA16effb8070810cff40fa35b28f606183ac7a1c771
SHA2567f0a2e7c1e06b6888e424619f9d9ee8e630d58d75106b8e7917aff9406267ecb
SHA512700f51b32713caef70d8e364f53b8cc887ed4f39fe727629979216d51ac030e175a4aa5adffef07cb7880a8cb46c5db853e9b3c6eae4dad19ca9b71a401b9dfe
-
Filesize
419KB
MD586447b80427974862f7388efe8675133
SHA15a8cbb5771ac82fb0eba1a886ae0357581277f6f
SHA25639b8cc32d4614148aa546ff23f1eec042e916f34b5a8501ffe3364a319fd8fbb
SHA512a6aa76330516f23be1939b6662f6f6b059d45b955ba0756be9daa163ff4b386a2dc3f4587d5a2b62018c12adfe7c10373568ae2bcebcc33c8232561b399d6681
-
Filesize
68KB
MD58d079185f12af41b56fffcc002dc12a4
SHA1ff644a414295c18d730a2c747fa941fe227d8ba9
SHA256cf98fcb82bb403af7467ef6029298aacc064b32f105e4e110200bf7346ff8ae9
SHA512c8e25aa47ae8b4966fbfb8590b065eb27c5de2d690f4614a1d476087d9ba1b13feae5b0f25bdb924d74b659091add841cc967279d66e7a30d0eb06bf4e70ac89
-
Filesize
49KB
MD58acda958959bc636ff7826aebfca0a42
SHA13a12d74f9bbb95b95d0b4f4f8e4cef501efa397c
SHA256b0444fae95da427fcb9aea845abbe14d93ec0dceef12cf91dd1646247239834c
SHA512d7f617d688750dfe755c1c17c7e59b280645d49764b593b1cb46c92ed7d885d6a31781e392f9a28069cfe84a94d5faa1f21f7f30a104aad67a00e7066491afce
-
Filesize
337KB
MD58fac9cf6e963209e7b61d56c3896c515
SHA167ad2c4294bf0e80859ae5bd3466c9ef4a3d52fc
SHA2568bec5ba7dcc48145cf6de3dbbc3d60d3f659fb1afe0f60176e51445a03824e72
SHA512c2dd508ba2bb8385cf16e88c2e0abe5babc077a798f92a37beb1955f4c0d153fa55e805809dbef10b100e038802f057b4999bc0fdf4d307641abf7c5ec058869
-
Filesize
214KB
MD553fef03691b1056173dac4f5c14c0a07
SHA13fde735da287dd66207d1970a5121eab826c22cb
SHA256f6b899640abb5ec0931c7b27c4c93a1ed7d20276a671627d0b479f9200b819c0
SHA512a1d47b23aa46fd32eefec2d1b996ab0b1016678cf5c95dd9647a8082f5844594f17366bf22e330bbc6843116f7ece0a4af58da8a80ce06f3765ac824f96433c6