Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
983b7c98aae7dd6b3e370c5c3d8d404a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
983b7c98aae7dd6b3e370c5c3d8d404a.exe
Resource
win10v2004-20231222-en
General
-
Target
983b7c98aae7dd6b3e370c5c3d8d404a.exe
-
Size
262KB
-
MD5
983b7c98aae7dd6b3e370c5c3d8d404a
-
SHA1
bfd6d26c2c573d3ba9859f391cb430678fed167a
-
SHA256
9435adb201110308b389ba5cb2f935de96a0190cc347dc28cbf7a41da45fe387
-
SHA512
429987cb8851d4d62f851a22275a56ae3d84a5e829835767fe71ca6c11a45cfb7aa132c312a4d3b3ca8ff5c2d20dea9d9fb472e2b3a43183ac1e2ae9b8c98cd7
-
SSDEEP
6144:2jJ8Gp+df0afmVTRMdQdpn94sLrNXel9Fb98+MAv6:uJ8YkfXf4TRMA94svNuzFb9ZU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1632 ises.exe -
Loads dropped DLL 1 IoCs
pid Process 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\{40C758C8-CEFB-AD4E-7138-F2B16CEAD1AC} = "C:\\Users\\Admin\\AppData\\Roaming\\Opyji\\ises.exe" ises.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2264 set thread context of 1900 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 29 -
Program crash 1 IoCs
pid pid_target Process procid_target 824 1900 WerFault.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Privacy 983b7c98aae7dd6b3e370c5c3d8d404a.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 983b7c98aae7dd6b3e370c5c3d8d404a.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe 1632 ises.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe Token: SeSecurityPrivilege 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe Token: SeSecurityPrivilege 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 1632 ises.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2264 wrote to memory of 1632 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 28 PID 2264 wrote to memory of 1632 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 28 PID 2264 wrote to memory of 1632 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 28 PID 2264 wrote to memory of 1632 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 28 PID 1632 wrote to memory of 1076 1632 ises.exe 12 PID 1632 wrote to memory of 1076 1632 ises.exe 12 PID 1632 wrote to memory of 1076 1632 ises.exe 12 PID 1632 wrote to memory of 1076 1632 ises.exe 12 PID 1632 wrote to memory of 1076 1632 ises.exe 12 PID 1632 wrote to memory of 1140 1632 ises.exe 15 PID 1632 wrote to memory of 1140 1632 ises.exe 15 PID 1632 wrote to memory of 1140 1632 ises.exe 15 PID 1632 wrote to memory of 1140 1632 ises.exe 15 PID 1632 wrote to memory of 1140 1632 ises.exe 15 PID 1632 wrote to memory of 1196 1632 ises.exe 13 PID 1632 wrote to memory of 1196 1632 ises.exe 13 PID 1632 wrote to memory of 1196 1632 ises.exe 13 PID 1632 wrote to memory of 1196 1632 ises.exe 13 PID 1632 wrote to memory of 1196 1632 ises.exe 13 PID 1632 wrote to memory of 1580 1632 ises.exe 23 PID 1632 wrote to memory of 1580 1632 ises.exe 23 PID 1632 wrote to memory of 1580 1632 ises.exe 23 PID 1632 wrote to memory of 1580 1632 ises.exe 23 PID 1632 wrote to memory of 1580 1632 ises.exe 23 PID 1632 wrote to memory of 2264 1632 ises.exe 27 PID 1632 wrote to memory of 2264 1632 ises.exe 27 PID 1632 wrote to memory of 2264 1632 ises.exe 27 PID 1632 wrote to memory of 2264 1632 ises.exe 27 PID 1632 wrote to memory of 2264 1632 ises.exe 27 PID 2264 wrote to memory of 1900 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 29 PID 2264 wrote to memory of 1900 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 29 PID 2264 wrote to memory of 1900 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 29 PID 2264 wrote to memory of 1900 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 29 PID 2264 wrote to memory of 1900 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 29 PID 2264 wrote to memory of 1900 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 29 PID 2264 wrote to memory of 1900 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 29 PID 2264 wrote to memory of 1900 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 29 PID 2264 wrote to memory of 1900 2264 983b7c98aae7dd6b3e370c5c3d8d404a.exe 29 PID 1900 wrote to memory of 824 1900 cmd.exe 31 PID 1900 wrote to memory of 824 1900 cmd.exe 31 PID 1900 wrote to memory of 824 1900 cmd.exe 31 PID 1900 wrote to memory of 824 1900 cmd.exe 31 PID 1632 wrote to memory of 576 1632 ises.exe 30 PID 1632 wrote to memory of 576 1632 ises.exe 30 PID 1632 wrote to memory of 576 1632 ises.exe 30 PID 1632 wrote to memory of 576 1632 ises.exe 30 PID 1632 wrote to memory of 576 1632 ises.exe 30 PID 1632 wrote to memory of 824 1632 ises.exe 31 PID 1632 wrote to memory of 824 1632 ises.exe 31 PID 1632 wrote to memory of 824 1632 ises.exe 31 PID 1632 wrote to memory of 824 1632 ises.exe 31 PID 1632 wrote to memory of 824 1632 ises.exe 31
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1076
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\983b7c98aae7dd6b3e370c5c3d8d404a.exe"C:\Users\Admin\AppData\Local\Temp\983b7c98aae7dd6b3e370c5c3d8d404a.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Roaming\Opyji\ises.exe"C:\Users\Admin\AppData\Roaming\Opyji\ises.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1632
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp6384eabd.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 1124⤵
- Program crash
PID:824
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1140
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1580
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-73151954121092935311792868294-389597356-954566899260017176-434677938429899974"1⤵PID:576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
366B
MD57ec7400e01da63b48a209f6bee15984c
SHA1b29f22715499c6b754cdffac0e3177104341f9a2
SHA2562fa639074c9b40a5b9b2deceabcf28df3d435049f69805b5b7e791314047bb87
SHA51237fc352f49b1c080d0e63c8d3d3cb506c37ddb258959c249f60f663d1019487430be09ad5083eb04361584f3ca1f2fd8c764421cbb090f7e7b7b96689f5a1b31
-
Filesize
262KB
MD5dda55546461138fdc420228c1ed15e9e
SHA109c6cdd3c036e92e2db5a0e7dafffe77a661904c
SHA256050c13be925b15fdf8f41cca34b668dd0a9ae2f27b5cad38e8a724fb99fb35f4
SHA512a33e9a435696994e0bb2163e0632a6b4d9add2ced494e3ec43cfbac11c50a09a77e8fbc8466d55632432b269f75555bfa85ea8091e121a55aef5715d9daef8a5