Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
ad858668281c5d4a464a7d7192f88e40.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad858668281c5d4a464a7d7192f88e40.exe
Resource
win10v2004-20240226-en
General
-
Target
ad858668281c5d4a464a7d7192f88e40.exe
-
Size
7KB
-
MD5
ad858668281c5d4a464a7d7192f88e40
-
SHA1
6bea4b7fd9165e7392ed1489683f387385a72469
-
SHA256
8a3dfcc82d3f2bb89aca95fb916dda38d1c3ffdfb574db1899a16896a6ccfc65
-
SHA512
c49d4363c75b558af1a8c0d96213eec8451fb20beb3e0fb956b20564b61005e9f46996a34f2a26b4d649bb75ab323f6a52ca34552096c4e10b6c9381958e74c5
-
SSDEEP
96:Ai1CGe/m7q3xvuWnYNFWzry4XfETl8GQSOPLpHfnL+liIpsU4+dTkx7:A6CGe/jvueO4qKSqj+McJ4+dT+7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2128 cmd.exe -
Installs/modifies Browser Helper Object 2 TTPs 1 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e3a729da-eabc-df50-1842-dfd682644311} ad858668281c5d4a464a7d7192f88e40.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\mswapi.dll ad858668281c5d4a464a7d7192f88e40.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e3a729da-eabc-df50-1842-dfd682644311}\InprocServer32 ad858668281c5d4a464a7d7192f88e40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e3a729da-eabc-df50-1842-dfd682644311}\InprocServer32\ = "C:\\Windows\\SysWow64\\mswapi.dll" ad858668281c5d4a464a7d7192f88e40.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e3a729da-eabc-df50-1842-dfd682644311}\InprocServer32\ThreadingModel = "Apartment" ad858668281c5d4a464a7d7192f88e40.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e3a729da-eabc-df50-1842-dfd682644311}\script = 18b449998991e1c3e4419e26a52314b4141bff389acda062d5152c24721b223ace0d ad858668281c5d4a464a7d7192f88e40.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{e3a729da-eabc-df50-1842-dfd682644311} ad858668281c5d4a464a7d7192f88e40.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2128 2224 ad858668281c5d4a464a7d7192f88e40.exe 29 PID 2224 wrote to memory of 2128 2224 ad858668281c5d4a464a7d7192f88e40.exe 29 PID 2224 wrote to memory of 2128 2224 ad858668281c5d4a464a7d7192f88e40.exe 29 PID 2224 wrote to memory of 2128 2224 ad858668281c5d4a464a7d7192f88e40.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad858668281c5d4a464a7d7192f88e40.exe"C:\Users\Admin\AppData\Local\Temp\ad858668281c5d4a464a7d7192f88e40.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\delt.bat" "2⤵
- Deletes itself
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
301B
MD5dafeb4854b6a9d303458a723fd47b04c
SHA1d41398227982d150e7ab6ea401ff95c95d1c3d73
SHA25683194b78f244cb13a4103040d2100392aa61c55f95aa9d498bb2d89d5f59cc56
SHA5124607baaf424fce1decc1f1e836c224cb8705ebb7f6001ee830108b38f5819b2902271b0d2612a205d367748dcc9e2eb8f9a7d51c0863454038e8b990a03808c6