Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/02/2024, 23:53
Static task
static1
Behavioral task
behavioral1
Sample
95b2b2ca29409fb8567c10b73bea72c1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
95b2b2ca29409fb8567c10b73bea72c1.exe
Resource
win10v2004-20231215-en
General
-
Target
95b2b2ca29409fb8567c10b73bea72c1.exe
-
Size
280KB
-
MD5
95b2b2ca29409fb8567c10b73bea72c1
-
SHA1
5bb34ba4916b873ca2ff94f4572cc9c03f3ce863
-
SHA256
7cc0826941071bfa2cbfdcdb58b9565212f8d8da1799c72fe77f69378a0656e4
-
SHA512
d910c1cf25f85859114ae503f59f75e3176f61b984d9ebbf679fa1d2c13149b85b947062a6efb41016778011390af68e2451ab73b7d686110f82b25bed72712e
-
SSDEEP
6144:qIFtC4lXlTiTOLwA99RlbxqhdmM21jutYLU1lOy74iy:d3l1mTOL97RlbxqhdmMKjeRGP
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2704 24FC2AE3023.exe 2840 24FC2AE3023.exe 2644 YUY6C2B.exe -
Loads dropped DLL 5 IoCs
pid Process 2664 95b2b2ca29409fb8567c10b73bea72c1.exe 2664 95b2b2ca29409fb8567c10b73bea72c1.exe 2704 24FC2AE3023.exe 2840 24FC2AE3023.exe 2840 24FC2AE3023.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\YI9B2F0F5EXHXB9ZBMM = "C:\\systemhost\\24FC2AE3023.exe" YUY6C2B.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 95b2b2ca29409fb8567c10b73bea72c1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 95b2b2ca29409fb8567c10b73bea72c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 24FC2AE3023.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 24FC2AE3023.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2040 set thread context of 2664 2040 95b2b2ca29409fb8567c10b73bea72c1.exe 29 PID 2704 set thread context of 2840 2704 24FC2AE3023.exe 32 -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PhishingFilter YUY6C2B.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" YUY6C2B.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" YUY6C2B.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery YUY6C2B.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" YUY6C2B.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2664 95b2b2ca29409fb8567c10b73bea72c1.exe 2664 95b2b2ca29409fb8567c10b73bea72c1.exe 2840 24FC2AE3023.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe 2644 YUY6C2B.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2664 95b2b2ca29409fb8567c10b73bea72c1.exe Token: SeDebugPrivilege 2664 95b2b2ca29409fb8567c10b73bea72c1.exe Token: SeDebugPrivilege 2664 95b2b2ca29409fb8567c10b73bea72c1.exe Token: SeDebugPrivilege 2664 95b2b2ca29409fb8567c10b73bea72c1.exe Token: SeDebugPrivilege 2840 24FC2AE3023.exe Token: SeDebugPrivilege 2840 24FC2AE3023.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe Token: SeDebugPrivilege 2644 YUY6C2B.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2664 2040 95b2b2ca29409fb8567c10b73bea72c1.exe 29 PID 2040 wrote to memory of 2664 2040 95b2b2ca29409fb8567c10b73bea72c1.exe 29 PID 2040 wrote to memory of 2664 2040 95b2b2ca29409fb8567c10b73bea72c1.exe 29 PID 2040 wrote to memory of 2664 2040 95b2b2ca29409fb8567c10b73bea72c1.exe 29 PID 2040 wrote to memory of 2664 2040 95b2b2ca29409fb8567c10b73bea72c1.exe 29 PID 2040 wrote to memory of 2664 2040 95b2b2ca29409fb8567c10b73bea72c1.exe 29 PID 2040 wrote to memory of 2664 2040 95b2b2ca29409fb8567c10b73bea72c1.exe 29 PID 2040 wrote to memory of 2664 2040 95b2b2ca29409fb8567c10b73bea72c1.exe 29 PID 2040 wrote to memory of 2664 2040 95b2b2ca29409fb8567c10b73bea72c1.exe 29 PID 2040 wrote to memory of 2664 2040 95b2b2ca29409fb8567c10b73bea72c1.exe 29 PID 2040 wrote to memory of 2664 2040 95b2b2ca29409fb8567c10b73bea72c1.exe 29 PID 2664 wrote to memory of 2704 2664 95b2b2ca29409fb8567c10b73bea72c1.exe 30 PID 2664 wrote to memory of 2704 2664 95b2b2ca29409fb8567c10b73bea72c1.exe 30 PID 2664 wrote to memory of 2704 2664 95b2b2ca29409fb8567c10b73bea72c1.exe 30 PID 2664 wrote to memory of 2704 2664 95b2b2ca29409fb8567c10b73bea72c1.exe 30 PID 2704 wrote to memory of 2840 2704 24FC2AE3023.exe 32 PID 2704 wrote to memory of 2840 2704 24FC2AE3023.exe 32 PID 2704 wrote to memory of 2840 2704 24FC2AE3023.exe 32 PID 2704 wrote to memory of 2840 2704 24FC2AE3023.exe 32 PID 2704 wrote to memory of 2840 2704 24FC2AE3023.exe 32 PID 2704 wrote to memory of 2840 2704 24FC2AE3023.exe 32 PID 2704 wrote to memory of 2840 2704 24FC2AE3023.exe 32 PID 2704 wrote to memory of 2840 2704 24FC2AE3023.exe 32 PID 2704 wrote to memory of 2840 2704 24FC2AE3023.exe 32 PID 2704 wrote to memory of 2840 2704 24FC2AE3023.exe 32 PID 2704 wrote to memory of 2840 2704 24FC2AE3023.exe 32 PID 2840 wrote to memory of 2644 2840 24FC2AE3023.exe 33 PID 2840 wrote to memory of 2644 2840 24FC2AE3023.exe 33 PID 2840 wrote to memory of 2644 2840 24FC2AE3023.exe 33 PID 2840 wrote to memory of 2644 2840 24FC2AE3023.exe 33 PID 2840 wrote to memory of 2644 2840 24FC2AE3023.exe 33 PID 2840 wrote to memory of 2644 2840 24FC2AE3023.exe 33 PID 2644 wrote to memory of 2664 2644 YUY6C2B.exe 29 PID 2644 wrote to memory of 2664 2644 YUY6C2B.exe 29 PID 2644 wrote to memory of 2664 2644 YUY6C2B.exe 29 PID 2644 wrote to memory of 2664 2644 YUY6C2B.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\95b2b2ca29409fb8567c10b73bea72c1.exe"C:\Users\Admin\AppData\Local\Temp\95b2b2ca29409fb8567c10b73bea72c1.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\95b2b2ca29409fb8567c10b73bea72c1.exeC:\Users\Admin\AppData\Local\Temp\95b2b2ca29409fb8567c10b73bea72c1.exe2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\systemhost\24FC2AE3023.exe"C:\systemhost\24FC2AE3023.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\systemhost\24FC2AE3023.exeC:\systemhost\24FC2AE3023.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\YUY6C2B.exe"C:\Users\Admin\AppData\Local\Temp\YUY6C2B.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
64KB
MD5dc981083093f405bb2cad39fb1f2086e
SHA19e636cc54825c531ac8ef84c3e783d4c5358f0fc
SHA256ba4a48f6fac5a2c98ce94dadececacfb18be53419db075072f705430cd712225
SHA51280f6fe461b82a10456c67fc2128ba43d5558df3bf45bdfa92aa56f8a789b9a1d8cf5fdbc9b56f43bf26ad3c235182d4322d8ebc5b32229f26cbc365fcf950b24
-
Filesize
280KB
MD595b2b2ca29409fb8567c10b73bea72c1
SHA15bb34ba4916b873ca2ff94f4572cc9c03f3ce863
SHA2567cc0826941071bfa2cbfdcdb58b9565212f8d8da1799c72fe77f69378a0656e4
SHA512d910c1cf25f85859114ae503f59f75e3176f61b984d9ebbf679fa1d2c13149b85b947062a6efb41016778011390af68e2451ab73b7d686110f82b25bed72712e