Analysis
-
max time kernel
142s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
b49149f98a8ec7a964655475ab8c56b6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b49149f98a8ec7a964655475ab8c56b6.exe
Resource
win10v2004-20240226-en
General
-
Target
b49149f98a8ec7a964655475ab8c56b6.exe
-
Size
340KB
-
MD5
b49149f98a8ec7a964655475ab8c56b6
-
SHA1
463510bebab62185d1736294717e1facac93b4c6
-
SHA256
cee20c67a2aef46a0e18b82fb45401245fd0e1be046ca960791d44288a7e3df2
-
SHA512
c23de96be5f86112d5f494c1b76f3bbcf488d1cdd2b69663de4f2f3fdbf58dc5456f0b2953e9ff1fb07e4bdcd8463f503f8e9ea57404c6c99281ed0393acdafe
-
SSDEEP
6144:T2wvPgIuVNEJF0mIl2GOmjwR03Bpf7JWw+DuDowGcJ9fUuZhPcPdJgNbLX5+nn29:TrgIuAJQl2uURWrfA1u8wG69fXhPcPdS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3032 043A6AEB00014973000BBDD9B4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 3032 043A6AEB00014973000BBDD9B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 2844 b49149f98a8ec7a964655475ab8c56b6.exe 2844 b49149f98a8ec7a964655475ab8c56b6.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6AEB00014973000BBDD9B4EB2331 = "C:\\ProgramData\\043A6AEB00014973000BBDD9B4EB2331\\043A6AEB00014973000BBDD9B4EB2331.exe" 043A6AEB00014973000BBDD9B4EB2331.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\SystemCertificates\DSL\CRLs b49149f98a8ec7a964655475ab8c56b6.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\SystemCertificates\DSL\CTLs b49149f98a8ec7a964655475ab8c56b6.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\SystemCertificates\DSL 043A6AEB00014973000BBDD9B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\SystemCertificates\DSL\Certificates 043A6AEB00014973000BBDD9B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\SystemCertificates\DSL\CRLs 043A6AEB00014973000BBDD9B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\SystemCertificates\DSL\CTLs 043A6AEB00014973000BBDD9B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\SystemCertificates\DSL b49149f98a8ec7a964655475ab8c56b6.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\SystemCertificates\DSL\Certificates b49149f98a8ec7a964655475ab8c56b6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2844 b49149f98a8ec7a964655475ab8c56b6.exe 3032 043A6AEB00014973000BBDD9B4EB2331.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3032 043A6AEB00014973000BBDD9B4EB2331.exe 3032 043A6AEB00014973000BBDD9B4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 3032 043A6AEB00014973000BBDD9B4EB2331.exe 3032 043A6AEB00014973000BBDD9B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3032 043A6AEB00014973000BBDD9B4EB2331.exe 3032 043A6AEB00014973000BBDD9B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 3032 2844 b49149f98a8ec7a964655475ab8c56b6.exe 28 PID 2844 wrote to memory of 3032 2844 b49149f98a8ec7a964655475ab8c56b6.exe 28 PID 2844 wrote to memory of 3032 2844 b49149f98a8ec7a964655475ab8c56b6.exe 28 PID 2844 wrote to memory of 3032 2844 b49149f98a8ec7a964655475ab8c56b6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b49149f98a8ec7a964655475ab8c56b6.exe"C:\Users\Admin\AppData\Local\Temp\b49149f98a8ec7a964655475ab8c56b6.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\ProgramData\043A6AEB00014973000BBDD9B4EB2331\043A6AEB00014973000BBDD9B4EB2331.exe"C:\ProgramData\043A6AEB00014973000BBDD9B4EB2331\043A6AEB00014973000BBDD9B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\b49149f98a8ec7a964655475ab8c56b6.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD5b49149f98a8ec7a964655475ab8c56b6
SHA1463510bebab62185d1736294717e1facac93b4c6
SHA256cee20c67a2aef46a0e18b82fb45401245fd0e1be046ca960791d44288a7e3df2
SHA512c23de96be5f86112d5f494c1b76f3bbcf488d1cdd2b69663de4f2f3fdbf58dc5456f0b2953e9ff1fb07e4bdcd8463f503f8e9ea57404c6c99281ed0393acdafe