Analysis
-
max time kernel
132s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
9846be42ed12e04092227e940aa3b157.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9846be42ed12e04092227e940aa3b157.exe
Resource
win10v2004-20231215-en
General
-
Target
9846be42ed12e04092227e940aa3b157.exe
-
Size
128KB
-
MD5
9846be42ed12e04092227e940aa3b157
-
SHA1
df2486420b6e90544c728c16f25c657f1db7b238
-
SHA256
8a0fe5b41e1c7c9cdc8a62d506e7dbc2adb3309b48f9ebba8457177cb9a3f868
-
SHA512
3da5bc396062539f62640c17e3ad2f6a3b6b9a83831f6c34631ec1c90b0998215d7908a63b9f18136fe1a9d94b7c6ba9236273f1369f71649480b078ea473d7a
-
SSDEEP
3072:CzukBP5XkZu2DI4Zu252IOFsPIcWu93b2O4Uy:/kBP5XkE2DLO4Ic593bP
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2624 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\dllcache\explorer.exe 9846be42ed12e04092227e940aa3b157.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\explorer.exe 9846be42ed12e04092227e940aa3b157.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2616 9846be42ed12e04092227e940aa3b157.exe 2616 9846be42ed12e04092227e940aa3b157.exe 2616 9846be42ed12e04092227e940aa3b157.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 explorer.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2616 9846be42ed12e04092227e940aa3b157.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe Token: SeShutdownPrivilege 2824 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe 2824 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2616 9846be42ed12e04092227e940aa3b157.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2624 2616 9846be42ed12e04092227e940aa3b157.exe 28 PID 2616 wrote to memory of 2624 2616 9846be42ed12e04092227e940aa3b157.exe 28 PID 2616 wrote to memory of 2624 2616 9846be42ed12e04092227e940aa3b157.exe 28 PID 2616 wrote to memory of 2624 2616 9846be42ed12e04092227e940aa3b157.exe 28 PID 2616 wrote to memory of 2624 2616 9846be42ed12e04092227e940aa3b157.exe 28 PID 2616 wrote to memory of 2624 2616 9846be42ed12e04092227e940aa3b157.exe 28 PID 2616 wrote to memory of 2624 2616 9846be42ed12e04092227e940aa3b157.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9846be42ed12e04092227e940aa3b157.exe"C:\Users\Admin\AppData\Local\Temp\9846be42ed12e04092227e940aa3b157.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C 1.bat2⤵
- Deletes itself
PID:2624
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115B
MD5e582d2f3e7d0335ffaec3066410b29ee
SHA15588d05ae97df335491493668f6871cc544435c9
SHA2569e3f8617a6d7482e74eaa880be13bb78b7c5ba86e23c80540e5d8d60114d38e6
SHA5127b1d254f060350488c773de35a7f901abd907cc630994fd1019f0fc7aa24765a6dc7302b190e287c87436bef95b8fd7655b33aac9650b25c760be046c473091a