Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 05:43
Static task
static1
Behavioral task
behavioral1
Sample
c296f32e10b78d8cc94b10946608946b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c296f32e10b78d8cc94b10946608946b.exe
Resource
win10v2004-20240226-en
General
-
Target
c296f32e10b78d8cc94b10946608946b.exe
-
Size
9.5MB
-
MD5
c296f32e10b78d8cc94b10946608946b
-
SHA1
95d0f81c048f7b95a7ee4080466a430594a43ffd
-
SHA256
906f07a6498d5b05aa305852fc31645465ecbdbadfd9eac5b2f96b2d6db1acde
-
SHA512
e60cb8b00814fafa6ab0d2ec6d18c3f18198070c91c2c7428a92dc3d2b73b39bd99fd642209bcd1745bbcf62952bf05f5cada2ff50afd18433813ebcacd88779
-
SSDEEP
49152:EQFRHrmQG+yrY+Fr/rY+FrEyrY+FrRrY+FrE5Y+Frv+Fr/rY+FrEyrY+C+FrEyr2:EcKW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2472 xtphc.exe -
Loads dropped DLL 2 IoCs
pid Process 1720 c296f32e10b78d8cc94b10946608946b.exe 1720 c296f32e10b78d8cc94b10946608946b.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Internet Explorer\Main xtphc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 xtphc.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2472 xtphc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2472 xtphc.exe 2472 xtphc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2472 1720 c296f32e10b78d8cc94b10946608946b.exe 28 PID 1720 wrote to memory of 2472 1720 c296f32e10b78d8cc94b10946608946b.exe 28 PID 1720 wrote to memory of 2472 1720 c296f32e10b78d8cc94b10946608946b.exe 28 PID 1720 wrote to memory of 2472 1720 c296f32e10b78d8cc94b10946608946b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c296f32e10b78d8cc94b10946608946b.exe"C:\Users\Admin\AppData\Local\Temp\c296f32e10b78d8cc94b10946608946b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\xtphc.exeC:\Users\Admin\AppData\Local\Temp\xtphc.exe -run C:\Users\Admin\AppData\Local\Temp\c296f32e10b78d8cc94b10946608946b.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
832KB
MD52e3659c1cc833fc3cabc3f0b7d131296
SHA181d2d028039e32dc1ee5b9df46aa0c62e119ca09
SHA25632782b4d4ac0b3615d7d85e6c0c729661309a3dd2bd25d01a89f9d0adfe4e558
SHA512b758f2d506637b26527ff11e0224ff76d34858ce321f91c80061b6f025899e2d6d8d7570d1fbd8f5c9764b460d62c5703f04361157e10886e599e9cd45fbe4a3
-
Filesize
5.6MB
MD5e21c07bd0c4a12017edc377d51dbecf0
SHA13e125398bfb1cca5e701d01ffe5f88bb479ead04
SHA256c0367e0641f9647f114fab7c8e953d056e63a91d5ae3c04e36415a096e2aa1c6
SHA5125ba5c384fe80d9140331c3a8f63e3bcd093d6166cb62bfedea425171a9e8ae737a5730651eb15638db4392d5006038f7aeb7bc80a0d4068bb3c1f0d1c0b48d0e
-
Filesize
4.2MB
MD51db15aa2fc8bacf47fd61d0a500e84b9
SHA1d68eb66ea237771b5749c6457a3b984f74256e31
SHA2566a9b2c99bbdaa1060281075ad259de0256737e3d05883bb2538fa7e4887da841
SHA512e2a29d75b1c0084aa8c16cab0dbb77e4829e93c945e705d9cb7be22cd56a7ab99a8fe8bdfed51de3b23ba9c9ae68305a6ee39e0e0a8912183f400f4b2e039844
-
Filesize
1.9MB
MD582b28c4b156423348feb03c265ba55e0
SHA13053c132365a830eaed1dac2f267dca23af2ae6b
SHA256ecc6a842837e2735dd8146dfceed59bc9f31349351aaf92422bed3eaf084e7d0
SHA512c73dd807a373659fd762a94a1ec4d8c263338969eaf357a00a563e9c959afef32ee2220f5f3269da09eb73e2b9ab43e802afab9e068eca796aefa22bec35f5c0
-
Filesize
320KB
MD56d9ae75a3f3936f0327d9546a7935c7c
SHA166372f4a77998989cd257f4cc35c7c6c5b30c605
SHA25688526507e129b589b31260fe29169f8b2b514ed2f9b94ff77c3b84dd1937a51b
SHA512a7ee62fd6f7f974d53c1a7acb2597cb8e7109fe2579f7bb8b96ee2bdc3b9628fa093dd88e7e46917a733b7868ef9b85083a058b9c1722f55495cddf3a2e742db