Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 20:53
Static task
static1
Behavioral task
behavioral1
Sample
c6d559aacbc92851ef23edfb2c83f9bf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6d559aacbc92851ef23edfb2c83f9bf.exe
Resource
win10v2004-20240226-en
General
-
Target
c6d559aacbc92851ef23edfb2c83f9bf.exe
-
Size
32KB
-
MD5
c6d559aacbc92851ef23edfb2c83f9bf
-
SHA1
0a3e2fad139090c5e6290cf9175fd8e8c5feea8c
-
SHA256
7b95123fd85fbeb9bbdb2137bf1a005bef69ce977253591749c3303be4a6ec06
-
SHA512
2ece1ef3ee6a9b63d3b78d3322cd31a2879753d19208aa95bc839b8751af4e93808e002b5f8fd2e3403082ffc1ad077890e3d120f105b91dabdfbff7cb28aad8
-
SSDEEP
768:ZSzsIdmoIBW+p1aPEbPiANtg9bPHhHXPNWNCB+Gc1H8zHvc:ZCsIdmoIBW+/aPUtg9zxB+52Dvc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" c6d559aacbc92851ef23edfb2c83f9bf.exe Set value (int) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Executes dropped EXE 1 IoCs
pid Process 2116 Admin.exe -
Loads dropped DLL 2 IoCs
pid Process 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" c6d559aacbc92851ef23edfb2c83f9bf.exe Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 2116 Admin.exe 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 2116 Admin.exe 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 2116 Admin.exe 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 2116 Admin.exe 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 2116 Admin.exe 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 2116 Admin.exe 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 2116 Admin.exe 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 2116 Admin.exe 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 2116 Admin.exe 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 2116 Admin.exe 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 2116 Admin.exe 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 2116 Admin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 2116 Admin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2116 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 28 PID 1936 wrote to memory of 2116 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 28 PID 1936 wrote to memory of 2116 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 28 PID 1936 wrote to memory of 2116 1936 c6d559aacbc92851ef23edfb2c83f9bf.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6d559aacbc92851ef23edfb2c83f9bf.exe"C:\Users\Admin\AppData\Local\Temp\c6d559aacbc92851ef23edfb2c83f9bf.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5d3b93dbed48af32d226a70db201d4cc4
SHA11671ec0d5ecd59af2745532b95d7f7ac45eccf23
SHA256da5a05b8792bdbe275a81310b60d354f8c7f0a0336d9c1342285084825a32b96
SHA51266699f0858bb198f7d6683889387c24255c8ecf66b2d6729a1b685bbad6232b6a4d8f8160bab5f4fc9c88366f2cae6d74276d2ffa3e906e7a8d6272690278756