Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
startup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
startup.exe
Resource
win10v2004-20240221-en
General
-
Target
startup.exe
-
Size
2.7MB
-
MD5
0c3c4751da6a247b3229c8a94b40fc74
-
SHA1
0e783415e91f632bc74240bee35463fcc049c283
-
SHA256
d40d7b877916f9c27391436f740430a4ad8fccfe1300cb86b8518f790d33a6a9
-
SHA512
24a0247c66624648ec47048846e5d79e09460f0053699d97c9b450c5168f9fc7d99738a2b916e905bbe5d07b62d71163d2a1bf50114603fe050c2087f66065e6
-
SSDEEP
49152:UA4GxC0r4i4zQwmGmgetbQG5pXWVg9tq2Kqjgyi79nb3Ug5G2Pju1yg7JWdLn:ZFrR4zQ/gKbQ45870gzRdAlK
Malware Config
Signatures
-
Checks for any installed AV software in registry 1 TTPs 48 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab startup.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride startup.exe Key queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Play_Background_Sounds startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Disable Diagnostics Mode startup.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\International startup.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Styles startup.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Text Scaling startup.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab startup.exe Key deleted \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Anchor Underline startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Enable AutoImageResize startup.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\International\Scripts startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Play_Animations startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\XMLHTTP startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\DisableScriptDebuggerIE startup.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Viewport startup.exe Key enumerated \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride startup.exe Key deleted \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride startup.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride startup.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Expand Alt Text startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\JScriptProfileCacheEventDelay startup.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Larger Hit Test startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Print_Background startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\SmoothScroll startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Move System Caret startup.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Settings startup.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\UseSWRender = "1" startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Use_DlgBox_Colors startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Disable Script Debugger startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\XDomainRequest startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\DOMStorage startup.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\AdvancedOptions\DISAMBIGUATION startup.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\MenuExt startup.exe Key opened \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\International\Scripts\3 startup.exe Key queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main startup.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Enable Browser Extensions = "no" startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\RtfConverterFlags startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\CSS_Compat startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Display Inline Images startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Display Inline Videos startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Show image placeholders startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\UseHR startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Cleanup HTCs startup.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main startup.exe Key queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab startup.exe Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\KasperskyLab\IEOverride\Main\Q300829 startup.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 startup.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
description ioc Process File opened (read-only) \??\VBoxMiniRdrDN startup.exe -
Executes dropped EXE 1 IoCs
pid Process 1728 startup.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 startup.exe 1728 startup.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main startup.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1728 startup.exe 1728 startup.exe 1728 startup.exe 1728 startup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1728 2020 startup.exe 28 PID 2020 wrote to memory of 1728 2020 startup.exe 28 PID 2020 wrote to memory of 1728 2020 startup.exe 28 PID 2020 wrote to memory of 1728 2020 startup.exe 28 PID 2020 wrote to memory of 1728 2020 startup.exe 28 PID 2020 wrote to memory of 1728 2020 startup.exe 28 PID 2020 wrote to memory of 1728 2020 startup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\startup.exe"C:\Users\Admin\AppData\Local\Temp\startup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\{47a081c0-d10f-11ee-bf06-56d57a935c49}\startup.exe"C:\Users\Admin\AppData\Local\Temp\{47a081c0-d10f-11ee-bf06-56d57a935c49}\startup.exe" /-nodrop /-"install=C:\Users\Admin\AppData\Local\Temp"2⤵
- Checks for any installed AV software in registry
- Writes to the Master Boot Record (MBR)
- Checks for VirtualBox DLLs, possible anti-VM trick
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d6e7de3a758dd8a27afc365c06caa082
SHA1b3b946e50226c88d4d19735e3ab95aafd9fe7a5d
SHA256323db54e745bc87bc6e14fec6e5ab6cfb2f095f2fc2153a5c92895f13234d1ec
SHA512f1d7a5ed5571d769621252d4e40cb071202b8ecda2e6206d299a732da4c0fb0a0515d62af8342d0b49a1c745857e081f455c3e941f24f63c4fcb1fbc64ec62b0
-
Filesize
2.7MB
MD50c3c4751da6a247b3229c8a94b40fc74
SHA10e783415e91f632bc74240bee35463fcc049c283
SHA256d40d7b877916f9c27391436f740430a4ad8fccfe1300cb86b8518f790d33a6a9
SHA51224a0247c66624648ec47048846e5d79e09460f0053699d97c9b450c5168f9fc7d99738a2b916e905bbe5d07b62d71163d2a1bf50114603fe050c2087f66065e6
-
Filesize
7.3MB
MD577b8c752e366381fb8f9ecb5da969d10
SHA152ad6ef1a9d1dc0d4eaaa8db7246f49846ecbab4
SHA25680af3f4eea24dcd733165eabeb409fc8f2ec966cf172a59b1d672c0ff2e67481
SHA512d5c06d47a64b2f1d1e6a584ee4183390fc75f5f1995baae17522a9db7764c6a66eec13e3be1814d7117552fcbda9ba43ec5bb12e3618588731c54d2d9938b1cd