Analysis
-
max time kernel
49s -
max time network
28s -
platform
windows7_x64 -
resource
win7-20240221-ja -
resource tags
arch:x64arch:x86image:win7-20240221-jalocale:ja-jpos:windows7-x64systemwindows -
submitted
07/03/2024, 17:19
Static task
static1
Behavioral task
behavioral1
Sample
Serb.exe
Resource
win7-20240221-ja
General
-
Target
Serb.exe
-
Size
3.9MB
-
MD5
a4cd81c294c112fd82a4abcb2b6bebf0
-
SHA1
9143dce76ecb158ac50fc328f6ebad23bc762b21
-
SHA256
eb698e6735684fb5a87fe9cc8af2853e921efb80e91211207f85c2ecde960513
-
SHA512
6802e4e8ad8fb7f943cca9cac1c25813104db4de624023f4dd5b8f9d2c1dc1689b41de42dc2856cfe83d9ce3e68183ee4e6c7ba553abafef8a9aac7211904dbc
-
SSDEEP
98304:emY+C/pcz/FOXnkWYfLj18kH5PS5LPstLlgLJBHe2PU:emY+2pcyk1GaPS5jQLlaJU2PU
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2536 autorun.exe 2684 B.exe -
Loads dropped DLL 4 IoCs
pid Process 2344 Serb.exe 2536 autorun.exe 2536 autorun.exe 2536 autorun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 2 IoCs
pid Process 2472 timeout.exe 2744 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" POWERPNT.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\MenuExt POWERPNT.EXE Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel POWERPNT.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" POWERPNT.EXE -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 2720 NOTEPAD.EXE 2996 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2700 POWERPNT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2536 autorun.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 268 shutdown.exe Token: SeRemoteShutdownPrivilege 268 shutdown.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2344 Serb.exe 2536 autorun.exe 2536 autorun.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2536 2344 Serb.exe 28 PID 2344 wrote to memory of 2536 2344 Serb.exe 28 PID 2344 wrote to memory of 2536 2344 Serb.exe 28 PID 2344 wrote to memory of 2536 2344 Serb.exe 28 PID 2344 wrote to memory of 2536 2344 Serb.exe 28 PID 2344 wrote to memory of 2536 2344 Serb.exe 28 PID 2344 wrote to memory of 2536 2344 Serb.exe 28 PID 2536 wrote to memory of 2684 2536 autorun.exe 30 PID 2536 wrote to memory of 2684 2536 autorun.exe 30 PID 2536 wrote to memory of 2684 2536 autorun.exe 30 PID 2536 wrote to memory of 2684 2536 autorun.exe 30 PID 2536 wrote to memory of 2684 2536 autorun.exe 30 PID 2536 wrote to memory of 2684 2536 autorun.exe 30 PID 2536 wrote to memory of 2684 2536 autorun.exe 30 PID 2684 wrote to memory of 2408 2684 B.exe 32 PID 2684 wrote to memory of 2408 2684 B.exe 32 PID 2684 wrote to memory of 2408 2684 B.exe 32 PID 2684 wrote to memory of 2408 2684 B.exe 32 PID 2408 wrote to memory of 1948 2408 cmd.exe 33 PID 2408 wrote to memory of 1948 2408 cmd.exe 33 PID 2408 wrote to memory of 1948 2408 cmd.exe 33 PID 2408 wrote to memory of 2472 2408 cmd.exe 34 PID 2408 wrote to memory of 2472 2408 cmd.exe 34 PID 2408 wrote to memory of 2472 2408 cmd.exe 34 PID 2700 wrote to memory of 3040 2700 POWERPNT.EXE 35 PID 2700 wrote to memory of 3040 2700 POWERPNT.EXE 35 PID 2700 wrote to memory of 3040 2700 POWERPNT.EXE 35 PID 2700 wrote to memory of 3040 2700 POWERPNT.EXE 35 PID 2408 wrote to memory of 2720 2408 cmd.exe 37 PID 2408 wrote to memory of 2720 2408 cmd.exe 37 PID 2408 wrote to memory of 2720 2408 cmd.exe 37 PID 2408 wrote to memory of 2744 2408 cmd.exe 38 PID 2408 wrote to memory of 2744 2408 cmd.exe 38 PID 2408 wrote to memory of 2744 2408 cmd.exe 38 PID 2408 wrote to memory of 268 2408 cmd.exe 39 PID 2408 wrote to memory of 268 2408 cmd.exe 39 PID 2408 wrote to memory of 268 2408 cmd.exe 39 PID 2408 wrote to memory of 2996 2408 cmd.exe 40 PID 2408 wrote to memory of 2996 2408 cmd.exe 40 PID 2408 wrote to memory of 2996 2408 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\Serb.exe"C:\Users\Admin\AppData\Local\Temp\Serb.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe"C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe" "SFXSOURCE:C:\Users\Admin\AppData\Local\Temp\Serb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Docs\B.exeC:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Docs\B.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\7272.tmp\7273.tmp\7274.bat C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Docs\B.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\msg.exemsg * Error bad Gateway at {103} At Setup.exe5⤵PID:1948
-
-
C:\Windows\system32\timeout.exetimeout /t 85⤵
- Delays execution with timeout.exe
PID:2472
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\note.txt5⤵
- Opens file in notepad (likely ransom note)
PID:2720
-
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
PID:2744
-
-
C:\Windows\system32\shutdown.exeshutdown /r /t 5 /m "Windows Error {Gateway Error: 23}"5⤵
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\note2.txt5⤵
- Opens file in notepad (likely ransom note)
PID:2996
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" /n "C:\Users\Admin\Desktop\StartUninstall.pot"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
331B
MD5fb2390ea0912c032c5400d48968999c5
SHA1096861629584e77c3cc98d1712f82459b0f984e3
SHA2567898e0ca3640114c202bc3a3a08c93f11c4148279b34cf7860f49443b343b1d2
SHA5128c2bcc40fd2dc93729c035c0b127fae00cf0ca8120b95d5a9627fb72077210975695564758eba8a22c19cab0b5b596e769c75af793a9852b7c033f57a0e4867c
-
Filesize
13KB
MD5f1886a3ccd3af98ac1fb13bd1c7c8a45
SHA1c9992562f97ad612bee7da6c17fbc9bb8948ab3d
SHA256109e9510f3a8fe03bd891e356e2b1681d707aea233fa8887197dcf478dbe4238
SHA5125d605bc569fa7b9c98a3122ebc78cc50ce45e1a2ce13fe3c9b9e555644985d8a9ebc4213fd06d4ae57841d52137b5d495e46c77b70d1f8ea4e88ef1f0407585a
-
Filesize
322KB
MD5c3256800dce47c14acc83ccca4c3e2ac
SHA19d126818c66991dbc3813a65eddb88bbcf77f30a
SHA256f26f4f66022acc96d0319c09814ebeda60f4ab96b63b6262045dc786dc7c5866
SHA5126865a98ad8a6bd02d1ba35a28b36b6306af393f5e9ad767cd6da027bb021f7399d629423f510c44436ac3e4603b6c606493edf8b14d21fabf3eab16d37bd0d25
-
Filesize
28B
MD5c795d3c9a28e426839d38112fcf2b4d6
SHA152c7c7ecd64382041140464b6a0c2d3924fa5dfe
SHA2569cddde5871aaba593b65754405156454096f80248521e911ea1569e1b0a974d3
SHA51247ac646d98998cd8af8637f53f795d9a92507a57d423d2e4f041330ddea1f39150975cb42d3df605a65ea29c1579a7710df310791048649c0b460ee21aceac69
-
Filesize
7B
MD5a8f28f60e832d1a678e19be7e462dc4c
SHA1fd57c8c97e2271b2ae89416bac29cf50527b21fd
SHA2560c8a6fb6fe59b6dc0323e9a78c093df5876ffdcb274d5a597fcc022bada61f4e
SHA512eb48c2e148c7c5cfe2b829f0bbac7d07686cb7e8a05c0ddd553cef1cdec490a7b2599119a8e3630ae1c3997408df609bb0d4fb045e87636c51b1a39d3ebef4cb
-
Filesize
89KB
MD597bc56c019bcc4128d156327373d568c
SHA1756666370a57a8b2410b770307b7858baecdaa0e
SHA256f92cd427afce9e4b1025f1e1a7f094c916abe850e98125b1939458cb7cca608c
SHA512ddbb143348fd37c8c5377bac491a1bd699a9ac9b1530c7366d748d6670e8b6dacea9afd4f1101438ca68b436af15dbb664e2fa17c414be63d23e0c3b908cd779
-
Filesize
6.1MB
MD592b320ed576ae9fa5184ddb05b0a42de
SHA16bf12f2a683027dcf2132484189e90490ce15825
SHA256d963ce914724e0fa09a0c0217a6661f8fdb4f59966ab982a8f27321b6cfe0eee
SHA51251db9dcd0b0a590dc778b927b8e9b2fc1ca40dbb9ebad302be51e86e1f4234b182de7b856fd035a5f6846050d8f6addd552a5a4aea9639f606ea9e768087bde8