Analysis
-
max time kernel
151s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 02:24
Behavioral task
behavioral1
Sample
c1a879ffc265e87b1b9e81d26c8f59de.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c1a879ffc265e87b1b9e81d26c8f59de.exe
Resource
win10v2004-20240226-en
General
-
Target
c1a879ffc265e87b1b9e81d26c8f59de.exe
-
Size
498KB
-
MD5
c1a879ffc265e87b1b9e81d26c8f59de
-
SHA1
13eb24e81040b10c1c972c1de60092c3b54384cb
-
SHA256
b682b8d96a53973096eb1f33242ec9aadd5d49c9f201fa5fc1bacc9c8103a8fa
-
SHA512
1abca9d0a4339bd4032fdc1914a97cb690f984d0abcee1acadfe9b937d27bb5dfa0faa18cc591d399f524208483ae6186034c8999702da03e972d200b54fdd7b
-
SSDEEP
12288:yQsGaO3M46pWntOm3bvMd3tj1a/xrHoS:yQsGp3MA3bYS1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2516 iE06509FaMlA06509.exe -
Executes dropped EXE 1 IoCs
pid Process 2516 iE06509FaMlA06509.exe -
Loads dropped DLL 1 IoCs
pid Process 3040 c1a879ffc265e87b1b9e81d26c8f59de.exe -
resource yara_rule behavioral1/memory/3040-0-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/3040-5-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/files/0x00320000000167bf-12.dat upx behavioral1/memory/3040-15-0x0000000002600000-0x00000000026C8000-memory.dmp upx behavioral1/memory/3040-17-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2516-18-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2516-24-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2516-28-0x0000000000400000-0x00000000004C8000-memory.dmp upx behavioral1/memory/2516-37-0x0000000000400000-0x00000000004C8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\iE06509FaMlA06509 = "C:\\ProgramData\\iE06509FaMlA06509\\iE06509FaMlA06509.exe" iE06509FaMlA06509.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1650401615-1019878084-3673944445-1000\Software\Microsoft\Internet Explorer\Main iE06509FaMlA06509.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3040 c1a879ffc265e87b1b9e81d26c8f59de.exe 3040 c1a879ffc265e87b1b9e81d26c8f59de.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3040 c1a879ffc265e87b1b9e81d26c8f59de.exe Token: SeDebugPrivilege 2516 iE06509FaMlA06509.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2516 iE06509FaMlA06509.exe 2516 iE06509FaMlA06509.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2516 3040 c1a879ffc265e87b1b9e81d26c8f59de.exe 28 PID 3040 wrote to memory of 2516 3040 c1a879ffc265e87b1b9e81d26c8f59de.exe 28 PID 3040 wrote to memory of 2516 3040 c1a879ffc265e87b1b9e81d26c8f59de.exe 28 PID 3040 wrote to memory of 2516 3040 c1a879ffc265e87b1b9e81d26c8f59de.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1a879ffc265e87b1b9e81d26c8f59de.exe"C:\Users\Admin\AppData\Local\Temp\c1a879ffc265e87b1b9e81d26c8f59de.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\ProgramData\iE06509FaMlA06509\iE06509FaMlA06509.exe"C:\ProgramData\iE06509FaMlA06509\iE06509FaMlA06509.exe" "C:\Users\Admin\AppData\Local\Temp\c1a879ffc265e87b1b9e81d26c8f59de.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5b7738674a968ffc7c7c5b0955fada478
SHA14a3112e865efd9f7f04a6234a0d6c224619757b8
SHA2568d5daf457eb1ea94f3ef8215dc02b2fd605b012b8a0c985579031c365f026609
SHA5126929008c5cfd2e79fbcbab0d1b6575ab1046193f43686308d36a4d594be5048b0bec8d32660389f238c615961f696a51f260e23b932ef116495d295bb3ae48cc
-
Filesize
498KB
MD59e4b2cef48ec42331002aea698d681d7
SHA19bfd3330f785f98e45bf95739e7fdacbf88d527d
SHA2568b730b0157e4f2fae3e5b0217ba357ce8b549ad5bd3badcfca981d6fe4c972b0
SHA512365c17fac0f53d3c5281f452080b5762ceed974bfa0665c38a67a9d06f5ccfddbf5dc2d7c626258b21b869534a01c81acd3bc21bd1a415221ca8b57eccd751c5