Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
8cf8e1c0b163521afb9c1c40813a9b7f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8cf8e1c0b163521afb9c1c40813a9b7f.exe
Resource
win10v2004-20231222-en
General
-
Target
8cf8e1c0b163521afb9c1c40813a9b7f.exe
-
Size
776KB
-
MD5
8cf8e1c0b163521afb9c1c40813a9b7f
-
SHA1
fa090042cb56a9f21f0a7cd4a466aa9f97be2472
-
SHA256
23d0f2aacf8997551b60bbe01faeede5dd0d7825a6e7bf3d1a87402948d82d54
-
SHA512
e196eb87810935a371b043127df2a84016548dc90d84548920592ba7db8260a7b30e0af9568dbaff0a5b315fa1af40ab8fe3fe60b62cfac81ecf931c48987fa8
-
SSDEEP
12288:24vpa+J0XOoT4tjumK/7KAf5w8OxrrxSo7ufQ/eFxCr8udw5lhe2v3u0L7rHyPSv:24vg+JkpBl/7KAfYrxSV/L003rHMnft
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2648-0-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-7-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-6-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-8-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-94-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-95-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-96-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-98-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-119-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-121-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-136-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-135-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-134-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-140-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-148-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-146-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-149-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-163-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-170-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-173-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-174-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-175-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-171-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-177-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-176-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-172-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-178-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-179-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-180-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-182-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-184-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-186-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-187-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-189-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-188-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-190-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-191-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-192-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-193-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-194-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-195-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-196-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-197-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-201-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-202-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-203-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-204-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-205-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-206-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-207-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-208-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-209-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-210-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-211-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx behavioral1/memory/2648-212-0x0000000001D40000-0x0000000001EA3000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is259410770.log 8cf8e1c0b163521afb9c1c40813a9b7f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Main 8cf8e1c0b163521afb9c1c40813a9b7f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2648 8cf8e1c0b163521afb9c1c40813a9b7f.exe 2648 8cf8e1c0b163521afb9c1c40813a9b7f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2648 8cf8e1c0b163521afb9c1c40813a9b7f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2648 8cf8e1c0b163521afb9c1c40813a9b7f.exe 2648 8cf8e1c0b163521afb9c1c40813a9b7f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cf8e1c0b163521afb9c1c40813a9b7f.exe"C:\Users\Admin\AppData\Local\Temp\8cf8e1c0b163521afb9c1c40813a9b7f.exe"1⤵
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
7KB
MD59b160398e940408e71cd97047b3ddb16
SHA1225cd2b16ff0de8df3cf602d5382ddd94a07350b
SHA2562b8865750f69538ad17f8fac71bf081b8151123918fa1c6f237939c63e2c81b1
SHA5125c5e364a2bbd10457793707a1d101b44cf693fb948dc047128284685c4d037dd5fdd751ca5118a6d31ba555b9d4cf9f760d4f15f79bd134cf4cd6bb5edae3c57
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
42KB
MD540f0e8b3f84f3871c58ae05fbe4b837d
SHA1791bd541ccf476850c3a0da6255a6d5a8f8662a7
SHA25622ccf489b918195b6547c303b9b95868b9e9db021b59a304a835f40b92c6966b
SHA5126190e630821122eddfe9a9fa27cb442c9491e4db1a88a2621915ee5c38acd72f7e9d9eb243c41469bdf94dc45a8b560b16d727892c22d0ff0392843bd26a85a7
-
Filesize
1KB
MD5b5680d31a09579da2f6e57dd2dc4b525
SHA1caa1ebc4abbc86cdf33ef0cb496ee54f2c475575
SHA256937a69b5d26a5dcacb1b81cd90a2d05fd55618af4e32a7f2e9550449f4163bbc
SHA512d4a95c723b810355fb744120fb38660076b1724e6203c1f10f92165d2f097148bfa639279f933af329c44d8a1ed0eecaecbcad16f6502229ce3212fa50161ae7
-
Filesize
1KB
MD5f992568de636b9614a1ab918bdac0a18
SHA1fe1befdc20081e40bc06a0a4b92c92d55e289d73
SHA2569e0c56968ebe4c50d3b0687db6679ec7b636f94a87ac4712ecbeee8771ba5465
SHA51283bd3a449e9e2c844f4fe1bc1f18a7819453114200d55948256e994b36f4af92636ddcb63cf48d5641beab4d1bb2dd9cb79e3df9ba874d4bb30f831b5c8205ed
-
Filesize
1KB
MD5bc8345a8bb6c17f11bb40189a56041ab
SHA10089408770aaed9a7c0c7a3d96443c130e444dc5
SHA256a33d9275d1e63bc43ee052314ada5c2ea6562419f84f8e85f47476e6ca6a6b61
SHA51261adccff916aaceccfa4351a4edfd46d8f0a8b643a5ae7136d22326064912f02093e5a648128f08e38fb7cc6f811d5cca1b390ee0d3e7d9872a0f18c9f192158
-
Filesize
1KB
MD5b9bd269a0e7dc8a3c23a27de0a45c1ef
SHA17431dca8401e3219f777d4a7d5063465c8d6515e
SHA256beb7d7912bae8be99178ab58a04071ea15d7206a96e061f2181efb1e049f51ce
SHA5122d6507fe1825e4762b52863750543bda9f5a2180cf889461b7109fb14c3d3da1bd2e6545bdaff966d4cc57b6f7dabb6b049f27ca823e5d8dc48a4c1ee81ac8dd
-
Filesize
3KB
MD582d2680316054e60a611dd7a707a5aa4
SHA143ef69d4f7fbe2d368471cf70e06b01c6ffe0fa6
SHA256b4e486a4e693f2b6a33b108d28bec1a7fa34f9b683b274b342f568c3e7358dc6
SHA512b43f6a86a58962187d5219f1d49d1bf81836503323cfe5c55224eafb990e2d93f92c8b9a8277c613fac2c456748f2546b2b8bac47b38429097d2a7a1df8d9121
-
Filesize
3KB
MD5e17340d05d2d34d62b20ca9379e0a905
SHA1b9be3e8c43b9899d0e492b31c8d9623076fba286
SHA256d6420262bf449a5eab14284629242d6146462bceb1713074fd908af575c6edef
SHA512d8b6d4cad18ebeb6517cef3a42cd8d8a327e683fbb587dccf71fb4c4d52e3505d6eba7f6ae7d05b296ca529f93074a2c7d0a049181c52c52d411168af7c3c19f
-
Filesize
2KB
MD55995603e376b72b3f2f02d400b44584a
SHA14127535df235428d157f83006fa23225130215ce
SHA256392d2b22da905e8f2092d96116b6aa3326dbede98fc6f0c45e5b9146f9fc2f48
SHA51274aa387e04e79fab7b6ce570acada3d0cb882f440999f3539caf7bbd9ec505765d9b6b39cea5edfdb176b17186b302f21dcf059dc03ed0045a81595c9947a861
-
Filesize
1KB
MD541e2db8679de78b2a15a5ada20c0228f
SHA14e0cac7678928d838a61bf171c496b922c121f00
SHA256cbd36783ed6c4a4bae2414f76102032fcd0905b911c5596014ed0d14c5685b7a
SHA512aad04e4fd9ff2d90bbee9231b0c095f350393703c3e10351bafc1160896c30d0d3ed5f616bd9820742aed4295a698af392f6106995492bb532d0163d557642b2
-
Filesize
6KB
MD594cc832ec3a494140750e5de1feb671b
SHA17be57c13dda3badbba8eede215665ccad5f49ffc
SHA2566926902101ccb6dfe5d0759810b3e0d979971bc5ede6207f9b598c55358e483b
SHA5129f557d04b939ecb7d962e9b48f1525a637f53a0804fefd5e3f25a9bdda05b52412575161618a45675159523a768a0677c0659689bcb1e5a6021c7a6a8f06ab71
-
Filesize
14KB
MD5f3b1d247b28fe64cbc568fbe8102f911
SHA1f3b3dc197cee8500b800e977e7a10b514bfca3e4
SHA2566fe65dfb7c9a1675ada8c39ab352fa50a252a33f8a5e254bf041319fedabecb8
SHA5120a7867a76fa7717e1d1b3d84145783e911275ea313b5c286d89e40372196380ecabaaa0bc1bc20ad5d88fe25d56906842042f508de585f19923647f28812ac98
-
Filesize
42KB
MD5f3ccedb228f778e27166d8d1356459cc
SHA132eac241a918c9a27820761ce99103285f2d0e27
SHA25651ea56ffebf5eb9445529d8d8c8899e5344dd22ec646675c133897cca937412c
SHA512c4e45d8c424bf2a43baff30a5fe7ce93c21ea5a8eb18c80cb57ebdece04c9799897f01e0ab496280d1fdb869df34ca2be5259b6d66d66e40f1c0376d3be8cfa6