Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 15:16
Behavioral task
behavioral1
Sample
8ca951ff462d63e44c162df920a5179e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8ca951ff462d63e44c162df920a5179e.exe
Resource
win10v2004-20231215-en
General
-
Target
8ca951ff462d63e44c162df920a5179e.exe
-
Size
1.1MB
-
MD5
8ca951ff462d63e44c162df920a5179e
-
SHA1
b7f11facde4fd3985195bddb5c38d9fb2a9606a5
-
SHA256
20fe271f0bc00ce64d69ddb2b8a2e8df7b3be76e28501de17080d18cbf75fc8f
-
SHA512
637f1486567e4efc3cd3e05c1e5f6d314b8305333a3a79256fdceb3aeacd23cd6ee793b0f6a95fe6471f4c613c22f2894d9a05cd435f3a4cb2094b56e22a4f3d
-
SSDEEP
24576:zBgCkVrizucYSpcaaWVgqSzLXdMS04R2AFeZiTcrgM86xc3FX7R31ji:zBBFzBcWGqSzLf04R6i4kM8ccxR34
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2512 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 2040 8ca951ff462d63e44c162df920a5179e.exe -
resource yara_rule behavioral1/memory/2040-0-0x00000000010D0000-0x0000000001322000-memory.dmp upx behavioral1/files/0x000b000000014213-2.dat upx behavioral1/memory/2040-4-0x0000000002730000-0x0000000002982000-memory.dmp upx behavioral1/memory/2512-7-0x00000000012C0000-0x0000000001512000-memory.dmp upx behavioral1/memory/2040-9-0x00000000010D0000-0x0000000001322000-memory.dmp upx behavioral1/memory/2512-30-0x00000000012C0000-0x0000000001512000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" setup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 setup.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2512 setup.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2040 8ca951ff462d63e44c162df920a5179e.exe 2040 8ca951ff462d63e44c162df920a5179e.exe 2512 setup.exe 2512 setup.exe 2512 setup.exe 2512 setup.exe 2512 setup.exe 2512 setup.exe 2512 setup.exe 2512 setup.exe 2512 setup.exe 2512 setup.exe 2512 setup.exe 2512 setup.exe 2512 setup.exe 2512 setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2512 2040 8ca951ff462d63e44c162df920a5179e.exe 28 PID 2040 wrote to memory of 2512 2040 8ca951ff462d63e44c162df920a5179e.exe 28 PID 2040 wrote to memory of 2512 2040 8ca951ff462d63e44c162df920a5179e.exe 28 PID 2040 wrote to memory of 2512 2040 8ca951ff462d63e44c162df920a5179e.exe 28 PID 2040 wrote to memory of 2512 2040 8ca951ff462d63e44c162df920a5179e.exe 28 PID 2040 wrote to memory of 2512 2040 8ca951ff462d63e44c162df920a5179e.exe 28 PID 2040 wrote to memory of 2512 2040 8ca951ff462d63e44c162df920a5179e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ca951ff462d63e44c162df920a5179e.exe"C:\Users\Admin\AppData\Local\Temp\8ca951ff462d63e44c162df920a5179e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD560995d04e55f8d138cf5183e95942906
SHA1d90f51dd6705b94d7d3915dad623f61a7654a410
SHA25605b3464493d500473e1370aafd8c0b8db1678bd38353237141997607caf5c132
SHA5123886ba8025d96b3ba1522def75b997aec503505c14ec3364bba93fa8a5509c792b44bc67a9afbfcc4af9047bad69ae7c9dfd61ec094079cf7ddf3838704af871
-
Filesize
1.1MB
MD58ca951ff462d63e44c162df920a5179e
SHA1b7f11facde4fd3985195bddb5c38d9fb2a9606a5
SHA25620fe271f0bc00ce64d69ddb2b8a2e8df7b3be76e28501de17080d18cbf75fc8f
SHA512637f1486567e4efc3cd3e05c1e5f6d314b8305333a3a79256fdceb3aeacd23cd6ee793b0f6a95fe6471f4c613c22f2894d9a05cd435f3a4cb2094b56e22a4f3d