Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 15:39
Static task
static1
Behavioral task
behavioral1
Sample
a51d5a707b28c545b4e2b6c9c5242e3b2991687bf063410e9a216e729005f09d.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a51d5a707b28c545b4e2b6c9c5242e3b2991687bf063410e9a216e729005f09d.exe
Resource
win10v2004-20240226-en
General
-
Target
a51d5a707b28c545b4e2b6c9c5242e3b2991687bf063410e9a216e729005f09d.exe
-
Size
1.4MB
-
MD5
56b9cb49fec5544e3301cd377a502414
-
SHA1
ebb1a43aefb42013fc84391c561499069ba8da57
-
SHA256
a51d5a707b28c545b4e2b6c9c5242e3b2991687bf063410e9a216e729005f09d
-
SHA512
fe74fd0f983ca74f5596b471939158b3a7c95924475fb952aa55ebfc8ac708e7490e6aaf9d00d9dc34b5df183cb84d33632c511166f9e0be3e7d34cbdca48d78
-
SSDEEP
24576:ogRfEpzq1EpNA56UI3Xw9SJQx2E2CH3Q3JdFcnZzn0d1UaPD+DkUF:oOEpNA563Kbd2WA5XOzn0d1UaRU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main a51d5a707b28c545b4e2b6c9c5242e3b2991687bf063410e9a216e729005f09d.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch a51d5a707b28c545b4e2b6c9c5242e3b2991687bf063410e9a216e729005f09d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" a51d5a707b28c545b4e2b6c9c5242e3b2991687bf063410e9a216e729005f09d.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 a51d5a707b28c545b4e2b6c9c5242e3b2991687bf063410e9a216e729005f09d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2072 a51d5a707b28c545b4e2b6c9c5242e3b2991687bf063410e9a216e729005f09d.exe 2072 a51d5a707b28c545b4e2b6c9c5242e3b2991687bf063410e9a216e729005f09d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a51d5a707b28c545b4e2b6c9c5242e3b2991687bf063410e9a216e729005f09d.exe"C:\Users\Admin\AppData\Local\Temp\a51d5a707b28c545b4e2b6c9c5242e3b2991687bf063410e9a216e729005f09d.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2072