Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
9725a7de56c34a47d00e51699468f29d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9725a7de56c34a47d00e51699468f29d.exe
Resource
win10v2004-20231222-en
General
-
Target
9725a7de56c34a47d00e51699468f29d.exe
-
Size
152KB
-
MD5
9725a7de56c34a47d00e51699468f29d
-
SHA1
b00a9f953fba8aa6b62d71f3b0bdbe48d5bf550d
-
SHA256
25ae297b57bcca799f66702aecfa30265ffd285f94e4e991562d05bf18c9f7f5
-
SHA512
29e33a27bb4e45a25bc69f8a3be63d09f7abf0f6880e867f17b9d020fc5f45a763c5cf24843ffcd6156aa3731957d680a9825ff842972eaf3ed07d43d5d1ed90
-
SSDEEP
3072:2hi9pRE62jKEjZKgwVxx7d2xJ06o4y/QFzz9l6rhLsKH:MSEhj0gw7a0P4yYFz5srJB
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 9725a7de56c34a47d00e51699468f29d.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9725a7de56c34a47d00e51699468f29d.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\Q: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\L: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\J: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\Y: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\S: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\N: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\K: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\R: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\P: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\O: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\G: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\W: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\V: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\U: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\T: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\E: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\X: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\M: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\I: 9725a7de56c34a47d00e51699468f29d.exe File opened (read-only) \??\H: 9725a7de56c34a47d00e51699468f29d.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf 9725a7de56c34a47d00e51699468f29d.exe File opened for modification C:\autorun.inf 9725a7de56c34a47d00e51699468f29d.exe File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf 9725a7de56c34a47d00e51699468f29d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2620 2264 WerFault.exe 13 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2264 9725a7de56c34a47d00e51699468f29d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2620 2264 9725a7de56c34a47d00e51699468f29d.exe 28 PID 2264 wrote to memory of 2620 2264 9725a7de56c34a47d00e51699468f29d.exe 28 PID 2264 wrote to memory of 2620 2264 9725a7de56c34a47d00e51699468f29d.exe 28 PID 2264 wrote to memory of 2620 2264 9725a7de56c34a47d00e51699468f29d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9725a7de56c34a47d00e51699468f29d.exe"C:\Users\Admin\AppData\Local\Temp\9725a7de56c34a47d00e51699468f29d.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Enumerates connected drives
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 5602⤵
- Program crash
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
152KB
MD548fe36f75254c6374a68aaead8b3a45c
SHA16951bcf971a769cd52c877a94479909cb2e47794
SHA2564d01934ac807af73e5c2a0d9cf73a172caf5945472b67dba129dcdc9030a178b
SHA512e52dd4f999953accafc96c2c130ead7347819a2db9c2d7e9b5b1c697817cbdef8eab72e5028cc35e372f141fb8d5ff390e7091f8b8614c345948eeb7e5fb68a6
-
Filesize
152KB
MD597b604ae944eff6115502dd573800708
SHA11c70988b7903776b3c21a2e4834d89c0f88a6c8f
SHA2567e24c8193109512a720b73c84a6436207df62f3f207ae373814566f3cd5c9e09
SHA512b1f5fc0ec6f0da6cdf30acc5eded2df67b7e09a58c262c4995f8036802f65962b8fd17327fc601015f5aeae3dd7665f2165401287ccef0aa9a24614b8e47cab8