Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20-03-2024 02:51
Static task
static1
Behavioral task
behavioral1
Sample
d7b2b72600f362026592d011a5d05816.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d7b2b72600f362026592d011a5d05816.exe
Resource
win10v2004-20240226-en
General
-
Target
d7b2b72600f362026592d011a5d05816.exe
-
Size
922KB
-
MD5
d7b2b72600f362026592d011a5d05816
-
SHA1
6cccb71befdc892fd8c5580be23dd0a5abf66b3f
-
SHA256
cff77fc0706799bd9fbef9698d1c45a2b435a906dfff9f20dd026406f467b113
-
SHA512
97beae48735bc04b5429e351f6c85828d99115141e08fcd76cb93d0685b1fa1e532a50f404b8878d09d2f3640ef1a0bf7c4307fecaf850da5a7c22c50b15ef45
-
SSDEEP
24576:3fbEK3qFGfFe0eveAc5pffBzNfpTFrjzU1P:3TFyEFRv5pXtNfpT5i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3068 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3032 288896779.exe -
Loads dropped DLL 4 IoCs
pid Process 3068 cmd.exe 3068 cmd.exe 3032 288896779.exe 3032 288896779.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\d7b2b72600f362026592d011a5d05816 = "\"C:\\Users\\Admin\\AppData\\Local\\288896779.exe\" 0 30 " d7b2b72600f362026592d011a5d05816.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\288896779 = "\"C:\\Users\\Admin\\AppData\\Local\\288896779.exe\" 0 49 " 288896779.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2900 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 288896779.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe 3032 288896779.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2136 wrote to memory of 3068 2136 d7b2b72600f362026592d011a5d05816.exe 28 PID 2136 wrote to memory of 3068 2136 d7b2b72600f362026592d011a5d05816.exe 28 PID 2136 wrote to memory of 3068 2136 d7b2b72600f362026592d011a5d05816.exe 28 PID 2136 wrote to memory of 3068 2136 d7b2b72600f362026592d011a5d05816.exe 28 PID 3068 wrote to memory of 2900 3068 cmd.exe 30 PID 3068 wrote to memory of 2900 3068 cmd.exe 30 PID 3068 wrote to memory of 2900 3068 cmd.exe 30 PID 3068 wrote to memory of 2900 3068 cmd.exe 30 PID 3068 wrote to memory of 3032 3068 cmd.exe 31 PID 3068 wrote to memory of 3032 3068 cmd.exe 31 PID 3068 wrote to memory of 3032 3068 cmd.exe 31 PID 3068 wrote to memory of 3032 3068 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7b2b72600f362026592d011a5d05816.exe"C:\Users\Admin\AppData\Local\Temp\d7b2b72600f362026592d011a5d05816.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7134167672.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v d7b2b72600f362026592d011a5d05816 /f3⤵
- Modifies registry key
PID:2900
-
-
C:\Users\Admin\AppData\Local\288896779.exeC:\Users\Admin\AppData\Local\288896~1.EXE -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
922KB
MD5d7b2b72600f362026592d011a5d05816
SHA16cccb71befdc892fd8c5580be23dd0a5abf66b3f
SHA256cff77fc0706799bd9fbef9698d1c45a2b435a906dfff9f20dd026406f467b113
SHA51297beae48735bc04b5429e351f6c85828d99115141e08fcd76cb93d0685b1fa1e532a50f404b8878d09d2f3640ef1a0bf7c4307fecaf850da5a7c22c50b15ef45
-
Filesize
426B
MD56e1451ad4be35aa641f2abaad8641103
SHA1d8c25e5e9c46ec7016778c247f8c8a8a4724285b
SHA256242070f3e693c2dead1593bed037c3937db006198907255934c33c3b3b47b0d2
SHA5124823d1d156b2bda4a8cd5c70939e17615bb056c851c6677fc373567ee554ceadf5ded8b7a542bf6993554b8543b0c8e844a331e3c6b871ec5c45281175ed75d1