Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 15:27
Static task
static1
Behavioral task
behavioral1
Sample
c6383a1fba4fed6b3faa0b24d85a93ec.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6383a1fba4fed6b3faa0b24d85a93ec.exe
Resource
win10v2004-20240226-en
General
-
Target
c6383a1fba4fed6b3faa0b24d85a93ec.exe
-
Size
320KB
-
MD5
c6383a1fba4fed6b3faa0b24d85a93ec
-
SHA1
15fab436252475124d2d2ff1eeb388d3bc46e586
-
SHA256
ea1577b6406765f0ccc2ff73ea8a9bf66f60c94d25742d34e1abe5b5026a0aed
-
SHA512
058dfc796c5536961dc4d5eaf6aada32fd7edfa276582ecfdddf2c56db8d66a06a668bead632c3beffb0f1a69ac24680e1486cc71cd9e4be0d559cd40327f4f2
-
SSDEEP
6144:59LL6KQfJ01opmXAZp5BZjbnTOxXZ0mUmThjeHdBAGsF:nL6KQhKXsBZjjKJ0mUkhjsKG
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 2228 kur.exe -
Loads dropped DLL 1 IoCs
pid Process 2524 c6383a1fba4fed6b3faa0b24d85a93ec.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2524 c6383a1fba4fed6b3faa0b24d85a93ec.exe 2524 c6383a1fba4fed6b3faa0b24d85a93ec.exe 2524 c6383a1fba4fed6b3faa0b24d85a93ec.exe 2524 c6383a1fba4fed6b3faa0b24d85a93ec.exe 2524 c6383a1fba4fed6b3faa0b24d85a93ec.exe 2524 c6383a1fba4fed6b3faa0b24d85a93ec.exe 2524 c6383a1fba4fed6b3faa0b24d85a93ec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1904 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1904 explorer.exe Token: SeShutdownPrivilege 1904 explorer.exe Token: SeShutdownPrivilege 1904 explorer.exe Token: SeShutdownPrivilege 1904 explorer.exe Token: SeShutdownPrivilege 1904 explorer.exe Token: SeShutdownPrivilege 1904 explorer.exe Token: SeShutdownPrivilege 1904 explorer.exe Token: SeShutdownPrivilege 1904 explorer.exe Token: SeShutdownPrivilege 1904 explorer.exe Token: SeShutdownPrivilege 1904 explorer.exe Token: SeShutdownPrivilege 1904 explorer.exe Token: SeShutdownPrivilege 1904 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe 1904 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2228 2524 c6383a1fba4fed6b3faa0b24d85a93ec.exe 31 PID 2524 wrote to memory of 2228 2524 c6383a1fba4fed6b3faa0b24d85a93ec.exe 31 PID 2524 wrote to memory of 2228 2524 c6383a1fba4fed6b3faa0b24d85a93ec.exe 31 PID 2524 wrote to memory of 2228 2524 c6383a1fba4fed6b3faa0b24d85a93ec.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6383a1fba4fed6b3faa0b24d85a93ec.exe"C:\Users\Admin\AppData\Local\Temp\c6383a1fba4fed6b3faa0b24d85a93ec.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\kur.exe"C:\Users\Admin\AppData\Local\kur.exe" -gav C:\Users\Admin\AppData\Local\Temp\c6383a1fba4fed6b3faa0b24d85a93ec.exe2⤵
- Executes dropped EXE
PID:2228
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5c6383a1fba4fed6b3faa0b24d85a93ec
SHA115fab436252475124d2d2ff1eeb388d3bc46e586
SHA256ea1577b6406765f0ccc2ff73ea8a9bf66f60c94d25742d34e1abe5b5026a0aed
SHA512058dfc796c5536961dc4d5eaf6aada32fd7edfa276582ecfdddf2c56db8d66a06a668bead632c3beffb0f1a69ac24680e1486cc71cd9e4be0d559cd40327f4f2