Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 12:13
Static task
static1
Behavioral task
behavioral1
Sample
be93b30011b5604b6d2e77d95acad25b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be93b30011b5604b6d2e77d95acad25b.exe
Resource
win10v2004-20231215-en
General
-
Target
be93b30011b5604b6d2e77d95acad25b.exe
-
Size
332KB
-
MD5
be93b30011b5604b6d2e77d95acad25b
-
SHA1
3c7692b70e1449ef4b0b8d0b6ad14bc838114301
-
SHA256
3e23fcd434d05af6b9ec3cd2382430c0ef8bd6cff67000b43dcc4110daed4039
-
SHA512
0be58f66bfa366c44a20fe1615fbc423487dd08595cd0176171b30c5a6bb45fb53de2349fc94c687ccce38fbb44abb34fb4a958b331f86e7f3455474fdba7ed5
-
SSDEEP
6144:pFNVIkU3Sx7YjyHq7KzjMIgSLYxlmJ3YtbVtwdSJ53S6AbofVo89T:pJIL3Kjr5gSOy3YZC6Bo
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2680 axj.exe -
Executes dropped EXE 1 IoCs
pid Process 2680 axj.exe -
Loads dropped DLL 2 IoCs
pid Process 1680 be93b30011b5604b6d2e77d95acad25b.exe 1680 be93b30011b5604b6d2e77d95acad25b.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\Content Type = "application/x-msdownload" axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\open\command axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\start axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\start\command axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\DefaultIcon axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\DefaultIcon\ = "%1" axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\runas axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\runas\command axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\ = "Application" axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\open axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\axj.exe\" -a \"%1\" %*" axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" axj.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" axj.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\open\command axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\ = "Application" axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" axj.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\DefaultIcon axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\DefaultIcon\ = "%1" axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\open axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\runas\command axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\open axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\runas axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\start\command axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\ = "exefile" axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\DefaultIcon axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\axj.exe\" -a \"%1\" %*" axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\Content Type = "application/x-msdownload" axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\start\command axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\open\command axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\start axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\DefaultIcon\ = "%1" axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\axj.exe\" -a \"%1\" %*" axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\runas axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\Content Type = "application/x-msdownload" axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" axj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\runas\command axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\exefile\shell\start axj.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\.exe\shell axj.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1680 be93b30011b5604b6d2e77d95acad25b.exe 1680 be93b30011b5604b6d2e77d95acad25b.exe 1680 be93b30011b5604b6d2e77d95acad25b.exe 1680 be93b30011b5604b6d2e77d95acad25b.exe 1680 be93b30011b5604b6d2e77d95acad25b.exe 1680 be93b30011b5604b6d2e77d95acad25b.exe 1680 be93b30011b5604b6d2e77d95acad25b.exe 1680 be93b30011b5604b6d2e77d95acad25b.exe 1680 be93b30011b5604b6d2e77d95acad25b.exe 2680 axj.exe 2680 axj.exe 2680 axj.exe 2680 axj.exe 2680 axj.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 2612 explorer.exe Token: SeShutdownPrivilege 2612 explorer.exe Token: SeShutdownPrivilege 2612 explorer.exe Token: SeShutdownPrivilege 2612 explorer.exe Token: SeShutdownPrivilege 2612 explorer.exe Token: SeShutdownPrivilege 2612 explorer.exe Token: SeShutdownPrivilege 2612 explorer.exe Token: SeShutdownPrivilege 2612 explorer.exe Token: SeShutdownPrivilege 2612 explorer.exe Token: SeShutdownPrivilege 2612 explorer.exe Token: SeShutdownPrivilege 2612 explorer.exe Token: SeShutdownPrivilege 2612 explorer.exe Token: SeShutdownPrivilege 2612 explorer.exe Token: SeShutdownPrivilege 2612 explorer.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2680 axj.exe 2680 axj.exe 2612 explorer.exe 2680 axj.exe 2612 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe 2612 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2680 axj.exe 2680 axj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2680 1680 be93b30011b5604b6d2e77d95acad25b.exe 28 PID 1680 wrote to memory of 2680 1680 be93b30011b5604b6d2e77d95acad25b.exe 28 PID 1680 wrote to memory of 2680 1680 be93b30011b5604b6d2e77d95acad25b.exe 28 PID 1680 wrote to memory of 2680 1680 be93b30011b5604b6d2e77d95acad25b.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\be93b30011b5604b6d2e77d95acad25b.exe"C:\Users\Admin\AppData\Local\Temp\be93b30011b5604b6d2e77d95acad25b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\axj.exe"C:\Users\Admin\AppData\Local\axj.exe" -gav C:\Users\Admin\AppData\Local\Temp\be93b30011b5604b6d2e77d95acad25b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2612
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD5be93b30011b5604b6d2e77d95acad25b
SHA13c7692b70e1449ef4b0b8d0b6ad14bc838114301
SHA2563e23fcd434d05af6b9ec3cd2382430c0ef8bd6cff67000b43dcc4110daed4039
SHA5120be58f66bfa366c44a20fe1615fbc423487dd08595cd0176171b30c5a6bb45fb53de2349fc94c687ccce38fbb44abb34fb4a958b331f86e7f3455474fdba7ed5