Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 05:32
Static task
static1
Behavioral task
behavioral1
Sample
d06324e91d5b7f81c9a144fb520c5896f82899271c1632ee0fbc0687a17cc4c5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d06324e91d5b7f81c9a144fb520c5896f82899271c1632ee0fbc0687a17cc4c5.exe
Resource
win10v2004-20231222-en
General
-
Target
d06324e91d5b7f81c9a144fb520c5896f82899271c1632ee0fbc0687a17cc4c5.exe
-
Size
949KB
-
MD5
3785efc90f48f4d73f80ac7c8a681cca
-
SHA1
e7bf26ad61392721a29b952794d72dc6f776e17d
-
SHA256
d06324e91d5b7f81c9a144fb520c5896f82899271c1632ee0fbc0687a17cc4c5
-
SHA512
249e4ddd349473f2469bf6a1e66c90c8478e94d2247c01f2d7338fb5caf6eec10560b88fdb850cc90de4ed3c70e24ff2bb09dce576f5b78940c682e13cae6f59
-
SSDEEP
24576:aRmJkcoQricOIQxiZY1iaK4hL8NzjA3xBJ4tgajm:/JZoQrbTFZY1iaKJlA3HSgaS
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4228 set thread context of 840 4228 d06324e91d5b7f81c9a144fb520c5896f82899271c1632ee0fbc0687a17cc4c5.exe 82 PID 840 set thread context of 3488 840 svchost.exe 43 PID 840 set thread context of 1576 840 svchost.exe 94 PID 1576 set thread context of 3488 1576 regsvr32.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \Registry\User\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 840 svchost.exe 840 svchost.exe 840 svchost.exe 840 svchost.exe 840 svchost.exe 840 svchost.exe 840 svchost.exe 840 svchost.exe 840 svchost.exe 840 svchost.exe 840 svchost.exe 840 svchost.exe 840 svchost.exe 840 svchost.exe 840 svchost.exe 840 svchost.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4228 d06324e91d5b7f81c9a144fb520c5896f82899271c1632ee0fbc0687a17cc4c5.exe 840 svchost.exe 3488 Explorer.EXE 3488 Explorer.EXE 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe 1576 regsvr32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4228 wrote to memory of 840 4228 d06324e91d5b7f81c9a144fb520c5896f82899271c1632ee0fbc0687a17cc4c5.exe 82 PID 4228 wrote to memory of 840 4228 d06324e91d5b7f81c9a144fb520c5896f82899271c1632ee0fbc0687a17cc4c5.exe 82 PID 4228 wrote to memory of 840 4228 d06324e91d5b7f81c9a144fb520c5896f82899271c1632ee0fbc0687a17cc4c5.exe 82 PID 4228 wrote to memory of 840 4228 d06324e91d5b7f81c9a144fb520c5896f82899271c1632ee0fbc0687a17cc4c5.exe 82 PID 3488 wrote to memory of 1576 3488 Explorer.EXE 94 PID 3488 wrote to memory of 1576 3488 Explorer.EXE 94 PID 3488 wrote to memory of 1576 3488 Explorer.EXE 94 PID 1576 wrote to memory of 540 1576 regsvr32.exe 95 PID 1576 wrote to memory of 540 1576 regsvr32.exe 95 PID 1576 wrote to memory of 540 1576 regsvr32.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d06324e91d5b7f81c9a144fb520c5896f82899271c1632ee0fbc0687a17cc4c5.exe"C:\Users\Admin\AppData\Local\Temp\d06324e91d5b7f81c9a144fb520c5896f82899271c1632ee0fbc0687a17cc4c5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\d06324e91d5b7f81c9a144fb520c5896f82899271c1632ee0fbc0687a17cc4c5.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:840
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD5fa472dda6c1ee62dcd53b5755920ac22
SHA1bf2514dd677d675a56567b07587c824959bc66e3
SHA2562ea015144400f6389de4fffa220181530dafb6c93e6e4a115084dd84b1d901c9
SHA5123ef18304cbadc3d520119e5388d23a4d308c5243f8126758d5e36a6de82137b5bc44cbb2477616bcdbc18f31b040f61cb7cd63842c13df64acb05662b4b47eac