Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 04:45

General

  • Target

    8e3f3c50ed832b76c5668fcf168182b1.exe

  • Size

    18KB

  • MD5

    8e3f3c50ed832b76c5668fcf168182b1

  • SHA1

    40783e25e50dafd21ffd4f465839d39d26afcb7b

  • SHA256

    e2b0f388e0013afe05115a79d0f095d9cdb35d7ea7d61edd0ffc29046fce2252

  • SHA512

    452c1a8dde585d6e8095c64ffcd549ba21ab9891ee942b687251287d71db62888139025f551d55a228994c283225532891effaec35fe5dc1220ded87ce9670b7

  • SSDEEP

    384:vyO/pImTheG/f94t6ARtRYN8fyJ6kNT7rQUSZL6uWGKRGZdpgH6pdWaNJawcudoD:v//GmsG/Gt6qYN3NTnVSZX4KIH6ppnbl

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e3f3c50ed832b76c5668fcf168182b1.exe
    "C:\Users\Admin\AppData\Local\Temp\8e3f3c50ed832b76c5668fcf168182b1.exe"
    1⤵
    • Adds policy Run key to start application
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Users\Admin\AppData\Local\Temp\sbsm.exe
      C:\Users\Admin\AppData\Local\Temp\sbsm.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\sbmdl.dll

    Filesize

    10KB

    MD5

    604e2fb38baffacd39c436cf3d736b66

    SHA1

    776bc57cd88b655da42aef3ec2accddd03da7cdd

    SHA256

    10995d6958fd5ff5827319e793391a3a1be1d33bf85f572dcaccab8f4ced5c17

    SHA512

    48b388af886f8d171983557443e5b11d5d4cc0a42ad92233af2948c87ed595f76532a77dba6c0fb50b2bd437f7e18bc227be26d8eb66a52bc7b1993e70d7b00d

  • C:\Users\Admin\AppData\Local\Temp\sbsm.exe

    Filesize

    5KB

    MD5

    0243158b002082798dba23cca4eddff8

    SHA1

    12ec97521c9ed8cd21b20d0f334e98a9651cfd14

    SHA256

    7134d7fafb1ebc607792dbda0a407a49344fd7e4fc230b87e44fe8df5e00f0eb

    SHA512

    f2a76a64258997b2298e91235086ffeb379ebe20b204b64328c8be50e35450984a987e059e5531c807c4b94be97b32c9a304ed36971c027b07014ad0d5e0212d

  • memory/920-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/920-5-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB

  • memory/920-10-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/920-12-0x0000000010000000-0x000000001000A000-memory.dmp

    Filesize

    40KB