Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
8cf6a5827a95d7e14be7b0bdc0bec1ec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8cf6a5827a95d7e14be7b0bdc0bec1ec.exe
Resource
win10v2004-20231215-en
General
-
Target
8cf6a5827a95d7e14be7b0bdc0bec1ec.exe
-
Size
7.2MB
-
MD5
8cf6a5827a95d7e14be7b0bdc0bec1ec
-
SHA1
1ea014ed096dcf31e3bb6a9cfbea8c593f3134c1
-
SHA256
61c9df97d8de061bccc8173368d5ad752d32ecd219cb78eafa830c1338212e7e
-
SHA512
74f2da0ad7e0213180c690ad5beb25d3211c7ab7667ad36d986ceaddfb68f0a9b00ff5839a3ae7bb7f313a728b2082a95ddc40ffd8f206702b21e1202985fc9a
-
SSDEEP
49152:EQFRHrmQG+yrY+Fr/rcrvrTrmrcrvrTrzr/rFrvrTrmrcrvrTrzr/R:EcKO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2888 p.exe -
Loads dropped DLL 2 IoCs
pid Process 2316 8cf6a5827a95d7e14be7b0bdc0bec1ec.exe 2316 8cf6a5827a95d7e14be7b0bdc0bec1ec.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Main p.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 p.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2888 p.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2888 p.exe 2888 p.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2888 2316 8cf6a5827a95d7e14be7b0bdc0bec1ec.exe 17 PID 2316 wrote to memory of 2888 2316 8cf6a5827a95d7e14be7b0bdc0bec1ec.exe 17 PID 2316 wrote to memory of 2888 2316 8cf6a5827a95d7e14be7b0bdc0bec1ec.exe 17 PID 2316 wrote to memory of 2888 2316 8cf6a5827a95d7e14be7b0bdc0bec1ec.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cf6a5827a95d7e14be7b0bdc0bec1ec.exe"C:\Users\Admin\AppData\Local\Temp\8cf6a5827a95d7e14be7b0bdc0bec1ec.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\p.exeC:\Users\Admin\AppData\Local\Temp\p.exe -run C:\Users\Admin\AppData\Local\Temp\8cf6a5827a95d7e14be7b0bdc0bec1ec.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303KB
MD5bca2ec90d9de9346dceb4bad58770191
SHA10c94f646d84d52a624842494b03b387995a4818f
SHA2566daa8e8422799c8788b145d7a7919c98101c1281a70f9b31b077e12a26b632d0
SHA512eb8bcf040142e159c85f140e4bd4252d8c8d68a8cfc9b673eec5a347176cbe2cd1e1b106c547139c04b0c38441477d3edf83919fe51eafdf2000feec6c8acb44
-
Filesize
165KB
MD5baef188ae0ccfc86596f4961af1b0da4
SHA130722d5f3dae65b949abd1bb8764dda24b6bf55e
SHA25614c3e3b97df4380d01ec648c14b9dcba165feb41305f72ae4ab7eaeb491edd82
SHA51267bad622c56b3098cb59e3dd1e331508f29bab9f049022b32f394499c8291544a21641fb4c7c000802253c2b6d4ff1f6e634579d569849ccdf089ae1d16c6759
-
Filesize
123KB
MD5b77f0ada4b5c75b1551375cb923df35c
SHA10907f90e08544ae3c65c4b9761996c07479ff9d2
SHA2569f18ec0ce69ffc6fc5c1aeb0cf99fd62274f4f8e4d0a345b8fe30ffa8dfadc6e
SHA5121ce2b5d3efbc2f32018e276fdf47edf090c77f957c1d5a8cb72ffc57bc3ee15a0ac3d81c0796e338eb2d48ee5af695932a4c9ef090f79d33284c6b4a65194404
-
Filesize
168KB
MD52a80b8e38086283a47be8dfcf294f44a
SHA14f9ca7be91ef2ebc0dac06b6ba32f8dc897f6983
SHA2565876aea22fa986d6d598db74ba96735e49f380ba0fee7b1f1476ffea6db15976
SHA512b51cfd45f431fc043d67a1a1deb6de429bebe79af42ae96d3d1147793eccebda8f08638e3c2121ff1360ef9aed9e35513b6afa0657d170fa0b603250c61aec0a
-
Filesize
170KB
MD576a41671b0b50b7632c00c74bcb004ab
SHA1c23ad0e313bc333f9a2793bb6f27031a931f4f01
SHA2563c246a0f62d88c427486716806161b84eec4b330b6d6a915c2187725e0a6ff04
SHA512d125c3439937ec32c7243ef26ddc3303e4814218f030f66367cb394893da759e57febd39563e00855b8f435a05d491ee7b008766b35b023c50d0ad48784f2bec