Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-03-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
0288860d3e3c82b1a9491301fdfcd5cf6759e5e2060ca58362e7abea694a0ddd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0288860d3e3c82b1a9491301fdfcd5cf6759e5e2060ca58362e7abea694a0ddd.exe
Resource
win10v2004-20231215-en
General
-
Target
0288860d3e3c82b1a9491301fdfcd5cf6759e5e2060ca58362e7abea694a0ddd.exe
-
Size
505KB
-
MD5
7dc0f025bb7ff459c023c573ff5fd856
-
SHA1
03475b217efa9d06c05443b9bce069ce11e0f0d4
-
SHA256
0288860d3e3c82b1a9491301fdfcd5cf6759e5e2060ca58362e7abea694a0ddd
-
SHA512
dffd3ac039f25591d5186b0f9daa7431ff1973fbb52fe126260e2fe24ae1902f7a018ec50d5bf6ebce2d12c7f51af0f51e5e89bd73e6e0521edfebf6441f32ae
-
SSDEEP
12288:Z6QTlw7u7eAefuwA8dzQD1NYYueR10lFMv:Z66OS7lwAf/zXv
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2976 0288860d3e3c82b1a9491301fdfcd5cf6759e5e2060ca58362e7abea694a0ddd.exe 2976 0288860d3e3c82b1a9491301fdfcd5cf6759e5e2060ca58362e7abea694a0ddd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main 0288860d3e3c82b1a9491301fdfcd5cf6759e5e2060ca58362e7abea694a0ddd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2976 0288860d3e3c82b1a9491301fdfcd5cf6759e5e2060ca58362e7abea694a0ddd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2976 0288860d3e3c82b1a9491301fdfcd5cf6759e5e2060ca58362e7abea694a0ddd.exe 2976 0288860d3e3c82b1a9491301fdfcd5cf6759e5e2060ca58362e7abea694a0ddd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0288860d3e3c82b1a9491301fdfcd5cf6759e5e2060ca58362e7abea694a0ddd.exe"C:\Users\Admin\AppData\Local\Temp\0288860d3e3c82b1a9491301fdfcd5cf6759e5e2060ca58362e7abea694a0ddd.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD5a56f705d15a4535430e40bf2907dbbcd
SHA1172329899e0898d69cf208b0173673fcc6c6ae09
SHA2566a39d989df65c8c20534c65e1c8dcc5534f4f03c3553cc6fd588f76dd1227b5d
SHA5127369dbc64e7c8c49c9546dcd3a1bac56d8ef9bfb7e9b68792e7fd24e8c81321c04b54c3ba7032068cd49c79df8d15074935f555b9ef478d89ff77eb86eb5e863
-
Filesize
405KB
MD5c1a74ba246610086f56d11f967239c27
SHA102fc117f8f111320fd4d40e3136b8126e3f411ca
SHA256411397f27c20f474a8e388a80a02859a26299c2c2bb519d61000eb34620f1be7
SHA5126eba4ec75aaa4ffcb2418e47b2c1bde0b5b03e360914fb60f89543bdf57f9ffdf707ce33061c41e7759a2e1b0199a3d20427a5e3e11c72220fed39935c2f6f04