Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
97a6d80fef701f78c64b684179abee62.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97a6d80fef701f78c64b684179abee62.exe
Resource
win10v2004-20231222-en
General
-
Target
97a6d80fef701f78c64b684179abee62.exe
-
Size
55KB
-
MD5
97a6d80fef701f78c64b684179abee62
-
SHA1
d621b354868afa4f4103f3ab2bd10f24134b6082
-
SHA256
1bce4b7d44c6b84b3605b287e57b0c919e3960734b88fcc192909074d34d2d57
-
SHA512
2e04e77783b0028be56e356e373fd7f1278cdc7543fa260094802c658f05e9e11b8a94f775d20c1b50c5192c7c4467f967c0ec272a33dd4b9b628f8d2b655c6a
-
SSDEEP
768:Oe3PFaDVyOQgljLDKRJyM3BmsHzSB4us/wJJapg4RoSMZeUZB/QosWpH+DrCUpfA:V3cpyORJLuB4P4AJJv4Romu/9tpvUZQ
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 97a6d80fef701f78c64b684179abee62.exe -
Deletes itself 1 IoCs
pid Process 2844 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2932 97a6d80fef701f78c64b684179abee62.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\ie13\Internat Explorer\Desktop.ini 97a6d80fef701f78c64b684179abee62.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\ie13\Internat Explorer\Desktop.ini 97a6d80fef701f78c64b684179abee62.exe File created C:\Program Files (x86)\Microsoft\ie13\Internat Explorer\target.lnk 97a6d80fef701f78c64b684179abee62.exe File opened for modification C:\Program Files (x86)\Microsoft\ie13\Internat Explorer attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.jgp\ = "jgpfile" 97a6d80fef701f78c64b684179abee62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jgpfile\DefaultIcon 97a6d80fef701f78c64b684179abee62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jgpfile 97a6d80fef701f78c64b684179abee62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\jgpfile\DefaultIcon\ = "%1" 97a6d80fef701f78c64b684179abee62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jgpfile\shell\open 97a6d80fef701f78c64b684179abee62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\jgpfile\shell\open\command\ = "explorer \"C:\\Program Files (x86)\\Microsoft\\%*ie%S3\\%2Internat Explorer\"" 97a6d80fef701f78c64b684179abee62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.jgp 97a6d80fef701f78c64b684179abee62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jgpfile\shell 97a6d80fef701f78c64b684179abee62.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jgpfile\shell\open\command 97a6d80fef701f78c64b684179abee62.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2196 2932 97a6d80fef701f78c64b684179abee62.exe 28 PID 2932 wrote to memory of 2196 2932 97a6d80fef701f78c64b684179abee62.exe 28 PID 2932 wrote to memory of 2196 2932 97a6d80fef701f78c64b684179abee62.exe 28 PID 2932 wrote to memory of 2196 2932 97a6d80fef701f78c64b684179abee62.exe 28 PID 2932 wrote to memory of 2196 2932 97a6d80fef701f78c64b684179abee62.exe 28 PID 2932 wrote to memory of 2196 2932 97a6d80fef701f78c64b684179abee62.exe 28 PID 2932 wrote to memory of 2196 2932 97a6d80fef701f78c64b684179abee62.exe 28 PID 2932 wrote to memory of 2844 2932 97a6d80fef701f78c64b684179abee62.exe 31 PID 2932 wrote to memory of 2844 2932 97a6d80fef701f78c64b684179abee62.exe 31 PID 2932 wrote to memory of 2844 2932 97a6d80fef701f78c64b684179abee62.exe 31 PID 2932 wrote to memory of 2844 2932 97a6d80fef701f78c64b684179abee62.exe 31 PID 2932 wrote to memory of 2844 2932 97a6d80fef701f78c64b684179abee62.exe 31 PID 2932 wrote to memory of 2844 2932 97a6d80fef701f78c64b684179abee62.exe 31 PID 2932 wrote to memory of 2844 2932 97a6d80fef701f78c64b684179abee62.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2196 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97a6d80fef701f78c64b684179abee62.exe"C:\Users\Admin\AppData\Local\Temp\97a6d80fef701f78c64b684179abee62.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" "C:\Program Files (x86)\Microsoft\ie13\Internat Explorer" +s2⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:2196
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp.bat" "2⤵
- Deletes itself
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186B
MD56deb28dcf633e2682295f02a8533d427
SHA18637ea7ae4a9c98d674ee7848d288a44b07f7c38
SHA256232559bdcb7f60122948d5185e23b5c4a776e86d22bce4145eaf1248bc606bb7
SHA512a3c8582b07cf502a3c42b1367e0280b99eec6a327a949dccedd73e69fa07f27d8c9bcef6a5040bcfbf3df532711f4932fcd13cb204067165d1e49ffeacfe5051
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667