Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 09:45
Behavioral task
behavioral1
Sample
c58e5e4805af3c570c5f87886abdcd0b.exe
Resource
win7-20240221-en
General
-
Target
c58e5e4805af3c570c5f87886abdcd0b.exe
-
Size
174KB
-
MD5
c58e5e4805af3c570c5f87886abdcd0b
-
SHA1
1f1ed0befea114674ab6c197737dab114eb1932d
-
SHA256
3ad2a0e7e10cf69142b1be12a1454552c67dff0b9d21adc0bd2f21cb55203314
-
SHA512
7dab6d84fb1e3f316c1e0927203582ffcd729a29c07398567826c1c1e846e1ca79c0d84dd35834a4e62fe85c60180ac1fb9201b1a0b55904b0a406bbd3247008
-
SSDEEP
3072:DBOorECV/ovJo+X3xhMeMJnxtkqXmsVpEs5FzmWD74w85DPwfhBu4b6RIkJI:9Om/82+dwxiqXmsBFX7udPuBQIF
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2192-0-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral1/memory/2192-8-0x0000000000400000-0x0000000000478000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BC462E4B-C520-4CA9-B1EC-A7DD36FD6D0A} c58e5e4805af3c570c5f87886abdcd0b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{BC462E4B-C520-4CA9-B1EC-A7DD36FD6D0A}\ c58e5e4805af3c570c5f87886abdcd0b.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\windivx.dll c58e5e4805af3c570c5f87886abdcd0b.exe File opened for modification C:\Windows\windivx.dll c58e5e4805af3c570c5f87886abdcd0b.exe File created C:\Windows\UJJFKGBUOGU c58e5e4805af3c570c5f87886abdcd0b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 c58e5e4805af3c570c5f87886abdcd0b.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2864 2192 c58e5e4805af3c570c5f87886abdcd0b.exe 28 PID 2192 wrote to memory of 2864 2192 c58e5e4805af3c570c5f87886abdcd0b.exe 28 PID 2192 wrote to memory of 2864 2192 c58e5e4805af3c570c5f87886abdcd0b.exe 28 PID 2192 wrote to memory of 2864 2192 c58e5e4805af3c570c5f87886abdcd0b.exe 28 PID 2192 wrote to memory of 2864 2192 c58e5e4805af3c570c5f87886abdcd0b.exe 28 PID 2192 wrote to memory of 2864 2192 c58e5e4805af3c570c5f87886abdcd0b.exe 28 PID 2192 wrote to memory of 2864 2192 c58e5e4805af3c570c5f87886abdcd0b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c58e5e4805af3c570c5f87886abdcd0b.exe"C:\Users\Admin\AppData\Local\Temp\c58e5e4805af3c570c5f87886abdcd0b.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s C:\Windows\windivx.dll2⤵PID:2864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5fa246deaf2fdcdcf98229bf7a70cc8e1
SHA17995fb78277ec06bcbfde9030b53c1b2b4648720
SHA256c2aca7dcae53db3063ce22b1a758945cefc0cda9595681f68edea0f6f0a6fd1f
SHA5126a6fd808074f5951b3e50c83a9c51e8520c5a13f0875f860151dc728cffb50cf4abaaa72182a7800d992d2f4fda46170b5981fcec9482d05815d5ba9696dab31