Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 11:50
Static task
static1
Behavioral task
behavioral1
Sample
8f1535281df97440df99312fd9ddefbe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f1535281df97440df99312fd9ddefbe.exe
Resource
win10v2004-20231222-en
General
-
Target
8f1535281df97440df99312fd9ddefbe.exe
-
Size
4.9MB
-
MD5
8f1535281df97440df99312fd9ddefbe
-
SHA1
87aadf12e680a2fdc2484e0ff6a7e0c16a82db29
-
SHA256
eda36078e21f3f5788badb1e26dfd07f775becfc8c16a4ae4eda88be25f746d1
-
SHA512
db199f76dd9a0f494a2909c09914d66698eb2d99e790627ca34a0545730d4edf77fdabe316655927bea48be06bdced186350ac7efcfc9c4b5e47972c87d7457f
-
SSDEEP
49152:EQFRHrmQG+yGwmQG+yG3QG+eQG+yGwRG3QG+eQG++3QG+uWrmQG+yGw9www+:EcKo0h8hdTd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2728 ivago.exe -
Loads dropped DLL 2 IoCs
pid Process 1216 8f1535281df97440df99312fd9ddefbe.exe 1216 8f1535281df97440df99312fd9ddefbe.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main ivago.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2728 ivago.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2728 ivago.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2728 ivago.exe 2728 ivago.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2728 1216 8f1535281df97440df99312fd9ddefbe.exe 28 PID 1216 wrote to memory of 2728 1216 8f1535281df97440df99312fd9ddefbe.exe 28 PID 1216 wrote to memory of 2728 1216 8f1535281df97440df99312fd9ddefbe.exe 28 PID 1216 wrote to memory of 2728 1216 8f1535281df97440df99312fd9ddefbe.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f1535281df97440df99312fd9ddefbe.exe"C:\Users\Admin\AppData\Local\Temp\8f1535281df97440df99312fd9ddefbe.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\ivago.exeC:\Users\Admin\AppData\Local\Temp\ivago.exe -run C:\Users\Admin\AppData\Local\Temp\8f1535281df97440df99312fd9ddefbe.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD537e265670819a61d5d2cadaeeac5c738
SHA11b19cc4ec72026443c77b21fff94b358fb156b55
SHA2562477369da205bc1d780488f1b0a0486403ec8eb7241cc51b7c3215c85049043d
SHA51240bf4aa2d2d18170fb3ae71eb12c53fd223c35eaac600ec1e08b7213edef1c70c5052d4499b4209d03c6d4205975dc4b7c6966bbb945926370bb1af5e914b135
-
Filesize
1.6MB
MD552f872c36cea1a6db80681427fdb2107
SHA154a35362eb4cc5f20e23648c7db2dbea8131f663
SHA25657a5b3fd62ba1e0ca4202b84440de8808015c435a5b3c8d0de398105a2b971f7
SHA5127dba958d9b1fad4ffc140887dd47f2b1ca76f455c3c89927196383a20f4de39201142f5a91c539aa44c5035680ec76bccfd24f9bf9a4428bf797abc83912a5fc
-
Filesize
2.1MB
MD5bccd56467c31ab97c3243def4bec27ca
SHA1fa9e66a7a947d602b1bf6ff1f2699c6310361afc
SHA25656f171e136963a0b06c6d868d1f76200f6d416217d6f9bc48b1117a4ead503b5
SHA5125ac7ddfb6a9d11f1f2d4d1b0fa747f9e310b46ad079f44dc365aa79e76eaf987a326496bf9e41a06c818496d2bd4b5db1bd0dcaec4a60c6f08a1d717240fe7c9
-
Filesize
2.7MB
MD508c6be18c24987d17e1c66b937697ae9
SHA1c0281ec0ca63f4837172960a25462589f509893e
SHA2561ee7fb14e2d5df25f55a22bdc60e325bdac1956b8989dc01e639b8741a60181f
SHA5120e6099d93148962a1b4f4ce6e6f07adbeba78619fc7c408f5941d1d1a263c965462de206a329c37c9877bf3cc0ea71fd7ec48bfe8672356ec5e6969451098510
-
Filesize
1.1MB
MD5abc70bd855acd22aa4d3574505a91bb5
SHA1b2b5aeac41b201d7874c255f2098de1484ad9add
SHA256b37cda752cee0b4e4de2c000fdcf5cf4dca6d60a0d5a7930692b4e7fae5ac0e9
SHA512cb286cbd69fe970e51761e0c1f65d6a8e8a124a10986b9c5c90664f6fc9858350b373a7ffe256c41c25d45dfb3637e535506102209b4efabeb3f725ee67babe0