Analysis
-
max time kernel
158s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
ba2d373f0d9cfa146b965ede778b1dfd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ba2d373f0d9cfa146b965ede778b1dfd.exe
Resource
win10v2004-20240226-en
General
-
Target
ba2d373f0d9cfa146b965ede778b1dfd.exe
-
Size
476KB
-
MD5
ba2d373f0d9cfa146b965ede778b1dfd
-
SHA1
e1c29a2e9d218f1d20f5a92feb2d2571aee53b6e
-
SHA256
a1615a4e1adbb2b09624675a61eb63963c2e7cad6a7f966e6258963b84bfe777
-
SHA512
2a2c1e56df48d7eeb81a2ec44891608362eb593d9c9bec8ec8b2d8f0fbe386786d31c920231aff30dfc9a0f1064d14aec34e9c72e993875dd5a81ecf96179f23
-
SSDEEP
6144:Y9UyM13yNdqQhw5lmiNmg/4PlYvE+PkQlvxWrA0hP+gnipimHwDATK+cGYnn5/cP:RyM13y1hw5lTOYB0h89HwE+p5jEA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1412 update.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mediaplayer.exe = "C:\\WINDOWS\\outs\\mediaplayer.exe" ba2d373f0d9cfa146b965ede778b1dfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lsasss.exe = "C:\\WINDOWS\\isass\\lsasss.exe" update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mediaplayer.exe = "C:\\WINDOWS\\outs\\mediaplayer.exe" update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lsasss.exe = "C:\\WINDOWS\\isass\\lsasss.exe" ba2d373f0d9cfa146b965ede778b1dfd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\isass\update.exe ba2d373f0d9cfa146b965ede778b1dfd.exe File opened for modification C:\WINDOWS\isass\update.exe ba2d373f0d9cfa146b965ede778b1dfd.exe File created C:\WINDOWS\isass\down.txt update.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4544 ba2d373f0d9cfa146b965ede778b1dfd.exe 4544 ba2d373f0d9cfa146b965ede778b1dfd.exe 1412 update.exe 1412 update.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4544 wrote to memory of 1412 4544 ba2d373f0d9cfa146b965ede778b1dfd.exe 90 PID 4544 wrote to memory of 1412 4544 ba2d373f0d9cfa146b965ede778b1dfd.exe 90 PID 4544 wrote to memory of 1412 4544 ba2d373f0d9cfa146b965ede778b1dfd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba2d373f0d9cfa146b965ede778b1dfd.exe"C:\Users\Admin\AppData\Local\Temp\ba2d373f0d9cfa146b965ede778b1dfd.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\WINDOWS\isass\update.exeC:\WINDOWS\isass\update.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
476KB
MD5ba2d373f0d9cfa146b965ede778b1dfd
SHA1e1c29a2e9d218f1d20f5a92feb2d2571aee53b6e
SHA256a1615a4e1adbb2b09624675a61eb63963c2e7cad6a7f966e6258963b84bfe777
SHA5122a2c1e56df48d7eeb81a2ec44891608362eb593d9c9bec8ec8b2d8f0fbe386786d31c920231aff30dfc9a0f1064d14aec34e9c72e993875dd5a81ecf96179f23