Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
c6c8947f5cb8b647a770d8e214273eb9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6c8947f5cb8b647a770d8e214273eb9.exe
Resource
win10v2004-20240226-en
General
-
Target
c6c8947f5cb8b647a770d8e214273eb9.exe
-
Size
14.8MB
-
MD5
c6c8947f5cb8b647a770d8e214273eb9
-
SHA1
a43aa4b8563650131ac94e624d48b67024255251
-
SHA256
2f4ba1c8e5197a8d4a991d35055ff6bab653f5bf4239262883f482661028b4d8
-
SHA512
13720d72fa188da66a3d18c3e90b5b2e02de4024fa49a6926111e8a83240345760c33acf083add6585e2b1ea1866b1ab67c6cb2d61445fbb4e7ed9243a9da2aa
-
SSDEEP
98304:EcKHfSAHfS+HfSAHfKSAHVHfS+HfSAHfK6:EY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2700 dti.exe -
Loads dropped DLL 2 IoCs
pid Process 3036 c6c8947f5cb8b647a770d8e214273eb9.exe 3036 c6c8947f5cb8b647a770d8e214273eb9.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main dti.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2700 dti.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2700 dti.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2700 dti.exe 2700 dti.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2700 3036 c6c8947f5cb8b647a770d8e214273eb9.exe 28 PID 3036 wrote to memory of 2700 3036 c6c8947f5cb8b647a770d8e214273eb9.exe 28 PID 3036 wrote to memory of 2700 3036 c6c8947f5cb8b647a770d8e214273eb9.exe 28 PID 3036 wrote to memory of 2700 3036 c6c8947f5cb8b647a770d8e214273eb9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6c8947f5cb8b647a770d8e214273eb9.exe"C:\Users\Admin\AppData\Local\Temp\c6c8947f5cb8b647a770d8e214273eb9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\dti.exeC:\Users\Admin\AppData\Local\Temp\dti.exe -run C:\Users\Admin\AppData\Local\Temp\c6c8947f5cb8b647a770d8e214273eb9.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD577c8c6bb0b45c7c42be81a6507ab875e
SHA169753691cc565a6aac6ee07e9bce4de9cdeaaecf
SHA256195f6b71d31e6e44ef77d049ac6fd3ca23e8407c1811d2c62b1a312c9260c5db
SHA512371539fdc3213bb94d0b37b12b932d056bc8d35f2546d6df678a53e083bb7b373f1d53fe0a3a23d5a4099d891294ab0ac1f1a5fabf985e4c44e8f3974816f136
-
Filesize
59KB
MD5a816e9c22d047479760e6f11ba248b78
SHA104ccc8eed3675ff4486a161e1593d31fa5085227
SHA2568202dc6a6ee0a94152327f24ffa8dba7845931513f7ba1db11ab8cfad88e1634
SHA512c6d9ed6a27c00049431decb15f4d900f646a01e6c76e54688301f0e1eded27edb3774d07fc0ad4829ccdb5f20605d58206307121fb1663677d2389e44c6df6c2
-
Filesize
1.6MB
MD51cee6b3c11728904d1e33dc2664d4739
SHA1218cbb71066c3404c1aaebf5437356baadc895cb
SHA2561731361053cdb00ec8cb51443c986a4f9a4e60afc0b01020adea52a1ecae1d9f
SHA512357517da62795bd04d8d2bb54ffeab57c69bf54bfb0eb9234d7a163b808fe50da599a2a17b9a4e6a6dc2e1fe133685a562092a2ec972cb3683193a9fc746b472
-
Filesize
1KB
MD50c929d16601a9248947369678f33a27e
SHA111c77b043ee7c49cec5b43627aef70fd7cb92396
SHA25649f182f21ac5fda2ae3bddfaa7cb36affd0bd15a1cfbd4768f285812ec77112e
SHA512cad920f5163f2dfdd277463fcee637db59956442e3912cc726eb55b517fb5066be621ba17f672315f39a1951b3fa38a2e71fe15aabf6eb25ee82832e4442e840