Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-02-2024 15:35

General

  • Target

    a983ab02d85c650d83b3daa0dc6b5cf3.exe

  • Size

    124KB

  • MD5

    a983ab02d85c650d83b3daa0dc6b5cf3

  • SHA1

    65c3bca645abf1e82fa3513fb6970fd984c40173

  • SHA256

    1d99830d342634540a53b4c0d7ffd21e0f79db3c88bedcbcfbfc9069aa611be0

  • SHA512

    bb27ad320c44f2567950b0fdeaee398ec09ed000efcbbc8a5d22ad86b1bc7c82b37ed3b72b7a69416b28fe01680330dd1bd0d268955b9b8fe9cc4855fa4838f4

  • SSDEEP

    1536:5g4yf1zwQVghp59gaqLy5FHV/Sz2jgzQHzdf:e4a1zwLV9gaqA/SSszUzt

Score
8/10

Malware Config

Signatures

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops autorun.inf file 1 TTPs 20 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a983ab02d85c650d83b3daa0dc6b5cf3.exe
    "C:\Users\Admin\AppData\Local\Temp\a983ab02d85c650d83b3daa0dc6b5cf3.exe"
    1⤵
    • Disables RegEdit via registry modification
    • Adds Run key to start application
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe \
      2⤵
        PID:2652
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3236

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\autorun.inf

      Filesize

      185B

      MD5

      4c2e31e25869e130a272c89a85c2d2a7

      SHA1

      6e591975707a89d5d24d534564b9095afebb0724

      SHA256

      01797c5f04a12507e7f4c386001aad53a4ad67a77d6acac6fcc46f13d4b072f8

      SHA512

      c5199530147043b93042fe919ba3271dc7f5ce0544f853625f9707bf4e21eb811e1c5551a6b958fb7a359d25c06ee44bd5c8fc9c266ad01af4c69e025414f379