Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
aa868b27fdc3c9e2dce5868e4f75c6a3.exe
Resource
win7-20240221-en
General
-
Target
aa868b27fdc3c9e2dce5868e4f75c6a3.exe
-
Size
765KB
-
MD5
aa868b27fdc3c9e2dce5868e4f75c6a3
-
SHA1
1ca98056657bb4a871f9468722df94b88c14e3e2
-
SHA256
505ae0a4f52a7917e6fda8902bbc47ff913c5c74abe3be30f87db9d075a6614a
-
SHA512
ec7faa23ba717f212d2dddc32bb033a44891d06c56df59476e1ea9bb440b0f08d201a9756b07e52b04cfdbbba4b58ed7717069c8246f55238f8efd7ff4eb135e
-
SSDEEP
12288:i3eo2TaTVCKnhk1W5A4N/Q8u7MHIVvMxA11lUByFen4veANO2v2LX5MnuWH1TmdJ:k52XKy1W5AcXETdQ4ve0O2vWDRv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3204 IEXPLORE.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA IEXPLORE.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\IEXPLORE.exe aa868b27fdc3c9e2dce5868e4f75c6a3.exe File opened for modification C:\Windows\IEXPLORE.exe aa868b27fdc3c9e2dce5868e4f75c6a3.exe File created C:\Windows\DELME.BAT aa868b27fdc3c9e2dce5868e4f75c6a3.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ IEXPLORE.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" IEXPLORE.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" IEXPLORE.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" IEXPLORE.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" IEXPLORE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3788 aa868b27fdc3c9e2dce5868e4f75c6a3.exe Token: SeDebugPrivilege 3204 IEXPLORE.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3204 IEXPLORE.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3788 wrote to memory of 3908 3788 aa868b27fdc3c9e2dce5868e4f75c6a3.exe 100 PID 3788 wrote to memory of 3908 3788 aa868b27fdc3c9e2dce5868e4f75c6a3.exe 100 PID 3788 wrote to memory of 3908 3788 aa868b27fdc3c9e2dce5868e4f75c6a3.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa868b27fdc3c9e2dce5868e4f75c6a3.exe"C:\Users\Admin\AppData\Local\Temp\aa868b27fdc3c9e2dce5868e4f75c6a3.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\DELME.BAT2⤵PID:3908
-
-
C:\Windows\IEXPLORE.exeC:\Windows\IEXPLORE.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3204
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:81⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD5de7030975edf137ceeeca8a4bc440d86
SHA1e55e10f9fe6e4a8210c5881d6dc7b10977ea4bcd
SHA25694bfc4d673aff92d97b592a51d2995301641469fbf3bf22d9caa94af3e58b106
SHA512ed0bbfbdc120db401bc9ab868da5dc73d8873192b27a3ba646ef4521aee0555cc5a1fd9238f66bef890a96e0f584cd3d7e570d2d26f5b182af585eca34c1e468
-
Filesize
765KB
MD5aa868b27fdc3c9e2dce5868e4f75c6a3
SHA11ca98056657bb4a871f9468722df94b88c14e3e2
SHA256505ae0a4f52a7917e6fda8902bbc47ff913c5c74abe3be30f87db9d075a6614a
SHA512ec7faa23ba717f212d2dddc32bb033a44891d06c56df59476e1ea9bb440b0f08d201a9756b07e52b04cfdbbba4b58ed7717069c8246f55238f8efd7ff4eb135e
-
Filesize
143KB
MD58de4c20260c3b46bf22202fe60e5b5ce
SHA175ef01ee0ebfc5638fcbad42717413e1a21bd257
SHA256514941ae6e717a5bc0a06a2265f56547edbf11d076f0a72d95e6f86e0c681319
SHA51238dcb7bcb28fdcec14bfaa8dc26e98cafbccc5adb0e5210c32a2c9070fd2d1003f04573b349a234f90e9d7aa0a775b090433216f57972f794bc5af6875bfcb2f