Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 04:31
Static task
static1
Behavioral task
behavioral1
Sample
964131af4ad550c0e046601f63e29251.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
964131af4ad550c0e046601f63e29251.exe
Resource
win10v2004-20231215-en
General
-
Target
964131af4ad550c0e046601f63e29251.exe
-
Size
653KB
-
MD5
964131af4ad550c0e046601f63e29251
-
SHA1
55beb4cb739fa96ff0b556a510e6351372cd7422
-
SHA256
e01303cb6615c17974dbd1fd571c8324bbd07cdedbc2456387d3b1ba3d415647
-
SHA512
6a7c6af711257ddb4c18b1bbc4f2c7fddaa6fac669ac77de8724e3d6c8ce0f7a0a16324e7bb0e786849a3e8f54ae8c7c578b9a355b37f156126631038fea8d8c
-
SSDEEP
12288:7bqGhoQMUfg/JUTphqrMpPholV6QOIAqPqihTujDmL5o:HzIUI/JUTphPp5cRAwqieil
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1716 964131af4ad550c0e046601f63e29251.exe 1716 964131af4ad550c0e046601f63e29251.exe 1716 964131af4ad550c0e046601f63e29251.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\bass.dll 964131af4ad550c0e046601f63e29251.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 43 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\DefaultIcon 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\ 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.php\ShellNew 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\compile\command 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SE\Source Filter 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\KrazSE.Document\Insertable 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\KrazSE.Document 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\open\command 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SE\shell\open 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SE\shell\open\command\ = "C:\\ProgramData\\KrazSE\\se.exe \"%1\" \"%2\" \"%3\"" 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.php 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\ = "KrazSE Dokument" 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\saver 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\saver\command 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\saver\command\ = "C:\\ProgramData\\KrazSE\\se.exe \"cs\" \"%1\" \"%2\" \"%3\"" 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SE\shell\ 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SE\shell\open\ 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SE\shell\open\command 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\KrazSE.Document\Insertable\ 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\DefaultIcon\ = "C:\\ProgramData\\KrazSE\\se.exe,0" 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SE 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.php\ShellNew\nullfile 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\open 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\open\command\ = "C:\\ProgramData\\KrazSE\\se.exe \"%1\" \"%2\" \"%3\"" 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\compile\ = "Anwendung erzeugen" 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\saver\ = "Bildschirmschoner erzeugen" 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SE\ = "URL:SE (KrazSE UrlProtocol)" 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{57DB3D67-0E61-4618-BBDA-6973653DCFD8\Insertable 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{57DB3D67-0E61-4618-BBDA-6973653DCFD8 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.php\ShellNew\ 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SE\URL Protocol 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.php\ = "phpfile" 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.php\ShellNew\command = "\"C:\\ProgramData\\KrazSE\\se.exe\" \"C:\\ProgramData\\KrazSE\\ShellNew.php\" \"%1\"" 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\open\ = "Ausführen" 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\compile 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SE\ 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SE\shell 964131af4ad550c0e046601f63e29251.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{57DB3D67-0E61-4618-BBDA-6973653DCFD8\Insertable\ 964131af4ad550c0e046601f63e29251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\phpfile\shell\compile\command\ = "C:\\ProgramData\\KrazSE\\se.exe \"c\" \"%1\" \"%2\" \"%3\"" 964131af4ad550c0e046601f63e29251.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2820 1716 964131af4ad550c0e046601f63e29251.exe 28 PID 1716 wrote to memory of 2820 1716 964131af4ad550c0e046601f63e29251.exe 28 PID 1716 wrote to memory of 2820 1716 964131af4ad550c0e046601f63e29251.exe 28 PID 1716 wrote to memory of 2820 1716 964131af4ad550c0e046601f63e29251.exe 28 PID 1716 wrote to memory of 2820 1716 964131af4ad550c0e046601f63e29251.exe 28 PID 1716 wrote to memory of 2820 1716 964131af4ad550c0e046601f63e29251.exe 28 PID 1716 wrote to memory of 2820 1716 964131af4ad550c0e046601f63e29251.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\964131af4ad550c0e046601f63e29251.exe"C:\Users\Admin\AppData\Local\Temp\964131af4ad550c0e046601f63e29251.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" "/s" "C:\ProgramData\KrazSE\KrazSE.dll"2⤵PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
653KB
MD5964131af4ad550c0e046601f63e29251
SHA155beb4cb739fa96ff0b556a510e6351372cd7422
SHA256e01303cb6615c17974dbd1fd571c8324bbd07cdedbc2456387d3b1ba3d415647
SHA5126a7c6af711257ddb4c18b1bbc4f2c7fddaa6fac669ac77de8724e3d6c8ce0f7a0a16324e7bb0e786849a3e8f54ae8c7c578b9a355b37f156126631038fea8d8c