Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/03/2024, 13:36
Static task
static1
Behavioral task
behavioral1
Sample
d3a617ca37bd40ec8c022a41d23ab98d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3a617ca37bd40ec8c022a41d23ab98d.exe
Resource
win10v2004-20240226-en
General
-
Target
d3a617ca37bd40ec8c022a41d23ab98d.exe
-
Size
13KB
-
MD5
d3a617ca37bd40ec8c022a41d23ab98d
-
SHA1
6fd9f563845b9f80dc7030871fa6726b5eeefb37
-
SHA256
46a8f9d2145486d2ee0f7dc953df560aa69c678597acb74f6dead2749df78117
-
SHA512
c753fa94fa964058337555faf7f51d74372317023f022068a7ec73e5184d38a17ed82eadec220ea3e0c089f460192cb22fb90aacb86c84a180533ba5b6b328c4
-
SSDEEP
384:56VuzApCt/qN2PXI5PJcnbsPLOuFW6fC:5LzAOI0I5husPLOuFs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2616 services.exe -
Loads dropped DLL 2 IoCs
pid Process 3064 d3a617ca37bd40ec8c022a41d23ab98d.exe 3064 d3a617ca37bd40ec8c022a41d23ab98d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\xp_system = "C:\\Windows\\inet20074\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xp_system = "C:\\Windows\\inet20074\\services.exe" services.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{5321E378-FFAD-4999-8C62-03CA8155F0B3}\ services.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5321E378-FFAD-4999-8C62-03CA8155F0B3} services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inet20074\services.exe d3a617ca37bd40ec8c022a41d23ab98d.exe File opened for modification C:\Windows\inet20074\services.exe d3a617ca37bd40ec8c022a41d23ab98d.exe File opened for modification C:\Windows\system.ini services.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main services.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2616 3064 d3a617ca37bd40ec8c022a41d23ab98d.exe 29 PID 3064 wrote to memory of 2616 3064 d3a617ca37bd40ec8c022a41d23ab98d.exe 29 PID 3064 wrote to memory of 2616 3064 d3a617ca37bd40ec8c022a41d23ab98d.exe 29 PID 3064 wrote to memory of 2616 3064 d3a617ca37bd40ec8c022a41d23ab98d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a617ca37bd40ec8c022a41d23ab98d.exe"C:\Users\Admin\AppData\Local\Temp\d3a617ca37bd40ec8c022a41d23ab98d.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\inet20074\services.exeC:\Windows\inet20074\services.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in Windows directory
- Modifies Internet Explorer settings
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5d3a617ca37bd40ec8c022a41d23ab98d
SHA16fd9f563845b9f80dc7030871fa6726b5eeefb37
SHA25646a8f9d2145486d2ee0f7dc953df560aa69c678597acb74f6dead2749df78117
SHA512c753fa94fa964058337555faf7f51d74372317023f022068a7ec73e5184d38a17ed82eadec220ea3e0c089f460192cb22fb90aacb86c84a180533ba5b6b328c4