Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-02-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
98b81cbae65f05785b0781dc2f97ae81.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98b81cbae65f05785b0781dc2f97ae81.exe
Resource
win10v2004-20231215-en
General
-
Target
98b81cbae65f05785b0781dc2f97ae81.exe
-
Size
14.9MB
-
MD5
98b81cbae65f05785b0781dc2f97ae81
-
SHA1
1b2dbc53d1e3a2a4eac60c2599ae2a317475cea7
-
SHA256
a65c40200fbb60a7b8aff743b5dc7c53684b0af90a071547e4ac6b525d02dff3
-
SHA512
27f881d73c77797e9f4f145b6f77bafca3dad35a66a0c01030757f7b29c354bd6c2b6eca2af84525f45012772b23af0c0e6b94a5db39cec53e10a215ccac33ff
-
SSDEEP
98304:EcKlLl8lknlyL5YL5cly3+knlyL5YL5clt5cly3+knlyLH+knly1:Eg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2864 w.exe -
Loads dropped DLL 2 IoCs
pid Process 928 98b81cbae65f05785b0781dc2f97ae81.exe 928 98b81cbae65f05785b0781dc2f97ae81.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main w.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 w.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2864 w.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2864 w.exe 2864 w.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 928 wrote to memory of 2864 928 98b81cbae65f05785b0781dc2f97ae81.exe 28 PID 928 wrote to memory of 2864 928 98b81cbae65f05785b0781dc2f97ae81.exe 28 PID 928 wrote to memory of 2864 928 98b81cbae65f05785b0781dc2f97ae81.exe 28 PID 928 wrote to memory of 2864 928 98b81cbae65f05785b0781dc2f97ae81.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\98b81cbae65f05785b0781dc2f97ae81.exe"C:\Users\Admin\AppData\Local\Temp\98b81cbae65f05785b0781dc2f97ae81.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Local\Temp\w.exeC:\Users\Admin\AppData\Local\Temp\w.exe -run C:\Users\Admin\AppData\Local\Temp\98b81cbae65f05785b0781dc2f97ae81.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
479KB
MD54ae0aff9c39e263764739610ec26120d
SHA137a9d2887d3ab7a180b7b5b29a59bb0096993a3c
SHA25671ebea2bb67a66c7e483c1ace7360b21dd5d81dbd55f7ebafec4c866f9ef79d2
SHA51268e42f7b55298cc5111faba8dfa1cc55f47922024be276b57589612487c5f8eff84b9c9e62cb11eb74037c07e73b540a5b927f487ca32a58fc48e3a8e7e64f35
-
Filesize
474KB
MD5f0e1775ca19b81efec292f134b203918
SHA19f7bcd90144e6483a656f35681e0d26b3dfcdc17
SHA2564c874e6d1a9235a472748ddc9c31bf3cb5ce12e7f080b31dae012df957530336
SHA512f4d860e2982333d9f8103f0f8cb6caab4304f80d2987e085de5ef6aabd838dd0e64bf5fee41c3af46ea839bb58d677f17b4e3356adc3430571d426b502792b1a
-
Filesize
252KB
MD58ba7c2cfc0a58e614f5843f48f65df2b
SHA1b8d2a05b4916859e43921fd5d3e08be01a08376c
SHA2564fd135ba4ee83abb21b9fc8b95afcb03cd5d0f993a25d65448c66781d67305b4
SHA5123f4790539577ee772284be7b596a025c8872bbeca724e1f1daafe1af50d4c976f19571d433366ddc16897fa8e175f463dbf15f90f4fb5f3b9d9bdd88f3c4f01e
-
Filesize
3.5MB
MD50fa5db97a408da4807b3df2a35a02460
SHA1e66b132a6eb27cbfef8a5c609d124bdad6618f4b
SHA256ae91843573f47f86f7c09ad2aaa09e674a23dc672aa13eea3c3e975c7cd8ac85
SHA5121543d75c2ceeb168702e0c3a5e8186cf67e056ce9831928d4d210b3ad8d48e6e70d8746af38548dbef36a6b606330b6912395b6648d51ecf7910592c26e1d301
-
Filesize
413KB
MD59c13f5051525ee096d4d0df9f35805d9
SHA13b4638995eef9d032f491d8de4f82111a58f559a
SHA2569d861012eda9b1586864bff415f470976d3828abae38d51119ca8d8765bf4e81
SHA5125efa9b39f0ab9773df33d065afd72351b1c77de64ae9b95a3bfff8737996ccc9cfe6ae1f9d219725504c32f6a44018276040392e4ec53ec339721e62b1701300