Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
c788c527aece17350cbb2f8ee898e5bb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c788c527aece17350cbb2f8ee898e5bb.exe
Resource
win10v2004-20231215-en
General
-
Target
c788c527aece17350cbb2f8ee898e5bb.exe
-
Size
5.4MB
-
MD5
c788c527aece17350cbb2f8ee898e5bb
-
SHA1
e6ed34d845a8a8dfcadf3c7de51a9f91e743182d
-
SHA256
5bd7168c99f4377b5b966cbace0e760c8a563318f8a8e151c2ba6996d7894e6c
-
SHA512
656fa514ea7cfee77cc3a82f4c58c1634bd7e678ddd333020c813f378a60c24558f239826d817da435e8ab0db4527c09206dc0823d240e1b81a0c7a057f04b02
-
SSDEEP
49152:EQFRHrmQG+dQG+jG+SGhxQG+dQG+jG+SGhQmQG+ZUrmQG+dQG+jG+SGh4QG+dQGh:EcKeWeYWeleWeYWuer
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1992 bkt.exe -
Loads dropped DLL 2 IoCs
pid Process 1152 c788c527aece17350cbb2f8ee898e5bb.exe 1152 c788c527aece17350cbb2f8ee898e5bb.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main bkt.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 bkt.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1992 bkt.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1992 bkt.exe 1992 bkt.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 1992 1152 c788c527aece17350cbb2f8ee898e5bb.exe 28 PID 1152 wrote to memory of 1992 1152 c788c527aece17350cbb2f8ee898e5bb.exe 28 PID 1152 wrote to memory of 1992 1152 c788c527aece17350cbb2f8ee898e5bb.exe 28 PID 1152 wrote to memory of 1992 1152 c788c527aece17350cbb2f8ee898e5bb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c788c527aece17350cbb2f8ee898e5bb.exe"C:\Users\Admin\AppData\Local\Temp\c788c527aece17350cbb2f8ee898e5bb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\bkt.exeC:\Users\Admin\AppData\Local\Temp\bkt.exe -run C:\Users\Admin\AppData\Local\Temp\c788c527aece17350cbb2f8ee898e5bb.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD543011ce89600e68c0d8ba0fd6f7335ac
SHA1686c8a7cedf2dc96b8081e49a503a62a6de194dc
SHA2563e863bc4dfdbe5ee5ecdba77fdb1c29ff9c9f15867b5d455f230e86375505412
SHA512b306ab06e821ad8a200e1192ac620f9fd3638037e46606955f8027061f900c8966f36be7c1589efd37c3386828d99a9edac3511aee78b1fc4b790a3fb381fbc2
-
Filesize
1.5MB
MD55cd1c4d6c42657c52a4b30d43a51977a
SHA1b9fec53b45d95f203d608f4b55ff599afe7031b2
SHA2561fe4bdc62c7025b4c27f0240d62a6865abeca8315cecbd0d5c013a80dd29c370
SHA512719a78d3899c00d0a3cba871b29a4a62ed702822d9352d5267ef9bb5a6be2ade91ff0b22403ef09285757743347786ff871204d4954dc1da009de3c0ee04a986
-
Filesize
1.7MB
MD5a69fa56276307b54d4363f4cb0bc1325
SHA1a8aa0a54b5253f437c34cbb0ecabca3d185af0b1
SHA256f7ee6f611d9d82c38cb0bb1efa1e202d789c6d57a787257b1a10a33cadaa9bfb
SHA51279df73d66862a4738735739413670a7fb7d28c12c7c0fb40f68edf81ba3a18d5667650ec1592eb4d1cf315b36352589fdf539c7e4786295308582205e33e2ef9
-
Filesize
1.9MB
MD59f7ade60ced606b8467b7c52d8cfdef0
SHA1649352ffe613e4f78ac9e0aa2c780e0991bfa8bf
SHA256df9f2d010a5707ebade7e68757a40c510515dadb79e344f29ef4c7fd374d122b
SHA512a4672817c7ac9814233c6aa5f3ad1235d3b810ae06a781da87c3d320927b6682ef178416845ddde21edffd08ade2e3cd69f5e28946642d78ca0a448a8793744d
-
Filesize
1.6MB
MD56fa6e23d6bf8c66826706cceb95e8915
SHA110923dbcc14744657d119e21b935bdda514428c5
SHA256cd34f111e079adb883a5dd6e15236f4a290ebdb63602958c3f5ddbbaa6654014
SHA512e73bc6163f2f3c64f0d6ff93d3e678896058b697a46afd790830789100819beef07f10fca300dbe759e6a59dba367a3749a34b9057c15c4ff338d525f128e1a3