Analysis
-
max time kernel
142s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23.exe
Resource
win10v2004-20240226-en
General
-
Target
0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23.exe
-
Size
301KB
-
MD5
9856e16d3fcfacdb5d00f51261f31908
-
SHA1
33199c0d1845352a1629c84f97551c03d61a9786
-
SHA256
0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23
-
SHA512
721419040e7a4d923b91c5c193f6d7aeff2effd0b879f210d3245fec8152044483d216da2a4ea22e53f9834e02f3744a1cdcd3847611dfa91bb0f3dd19608adb
-
SSDEEP
6144:c+LjhEB1aWggNOpqY8zzBZ9iEVXZZNTlCdXxiIDuYh:c+Llmdgg4nyXZZZNT6hXDr
Malware Config
Signatures
-
Detects executables packed with ConfuserEx Mod 3 IoCs
resource yara_rule behavioral1/memory/1644-5-0x00000000047A0000-0x000000000483E000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/files/0x000d00000001224f-3.dat INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1644-21-0x0000000000E70000-0x0000000000F36000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Loads dropped DLL 2 IoCs
pid Process 1644 0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23.exe 1644 0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main 0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1644 0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1644 0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23.exe 1644 0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23.exe"C:\Users\Admin\AppData\Local\Temp\0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608KB
MD56ad886fddcec2a8bd3d7ff4b18bbdf04
SHA135bea8f3e88d61c37fee34411f245ba1204f27e1
SHA256e31480f82305ffd0cbe33596006405ad9cc6bcbd91143ac236a180500a1996f1
SHA51264c1e29aafc55e05d22dd8c3ede6b0aa3a09438c7074f699cdfed999b5197ab46466bf796e00e4c99236200d295e39fec57f1e8a7c80223fd478264a84954296