Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 11:29
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.GenericKD.72064331.20544.29306.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.GenericKD.72064331.20544.29306.exe
Resource
win10v2004-20240226-en
General
-
Target
SecuriteInfo.com.Trojan.GenericKD.72064331.20544.29306.exe
-
Size
3.6MB
-
MD5
a7609e0f7ca5481ec2693ab6d779bbf6
-
SHA1
334c909ef79fbcd74d659ba77e851d24bd556474
-
SHA256
5be374c07abb0eaf554e553892894b3adef43aeda7460c12bc18178a546ccd9f
-
SHA512
4374a98a90ea6c043b8e9767c552b364409f728180924e59b178ae61471b2daa07d457d2da618de221e6b742226562a0a7b1f52c2e2c56d60496c696543c2b1e
-
SSDEEP
49152:YlOhBCfLUjME9UI7JJqWun8s3gt9LoHwjvTyXdC8fZOO:YCF9FtgTOvLMCzO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3052 Thien Nguyen Productions Framework.exe -
Loads dropped DLL 1 IoCs
pid Process 352 SecuriteInfo.com.Trojan.GenericKD.72064331.20544.29306.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\FSC Utilities Plugin by Thien Nguyen = "C:\\Users\\Admin\\AppData\\Local\\Temp\\SecuriteInfo.com.Trojan.GenericKD.72064331.20544.29306.exe" Thien Nguyen Productions Framework.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION Thien Nguyen Productions Framework.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\MAIN Thien Nguyen Productions Framework.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Thien Nguyen Productions Framework.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION Thien Nguyen Productions Framework.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Thien Nguyen Productions Framework.exe = "11001" Thien Nguyen Productions Framework.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3052 Thien Nguyen Productions Framework.exe 3052 Thien Nguyen Productions Framework.exe 3052 Thien Nguyen Productions Framework.exe 3052 Thien Nguyen Productions Framework.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3052 Thien Nguyen Productions Framework.exe 3052 Thien Nguyen Productions Framework.exe 3052 Thien Nguyen Productions Framework.exe 3052 Thien Nguyen Productions Framework.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3052 Thien Nguyen Productions Framework.exe 3052 Thien Nguyen Productions Framework.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 352 wrote to memory of 3052 352 SecuriteInfo.com.Trojan.GenericKD.72064331.20544.29306.exe 28 PID 352 wrote to memory of 3052 352 SecuriteInfo.com.Trojan.GenericKD.72064331.20544.29306.exe 28 PID 352 wrote to memory of 3052 352 SecuriteInfo.com.Trojan.GenericKD.72064331.20544.29306.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.72064331.20544.29306.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.72064331.20544.29306.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Users\Admin\AppData\Local\Temp\Thien Nguyen Productions Framework.exe"C:\Users\Admin\AppData\Local\Temp\Thien Nguyen Productions Framework.exe" "\\.\pipe\FSC Utilities Plugin" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.72064331.20544.29306.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
1.6MB
MD52c567b0c6317abaa6c43ebb39146552b
SHA11e89cdfa16bfc7036da15d0b8e0eb13228851e61
SHA2561c8c2b3179d38d520b223e00ad5d1be0820c96652a579a46a3ad542820c4f461
SHA512d8553a778279100ec01c194169540b5f6e3b3dc1fa146f31cc6c9dc5f920d0ba51c94423836b22d45dd3f085a17562a0460197545990511729271cba83cae078
-
Filesize
474B
MD5e6007ddcb477d42412170e0156055cef
SHA13ecdc671b9547eee4bc4957e0603d9a184453fb9
SHA256be81c504de3d2bbf534e73c0e89240b4590bb5f5b7cc5877a7e25ae9c8ef46d0
SHA51283055b4f98661b0cf3af5925f7a145db7f48184c5e2765e6710b9f136ab11c06ead8317642a2e8bd27209fb5ad1b5e25074b027b9b97a62b55bbcdb2261845ec
-
Filesize
60B
MD5edbb4f96a38d6da14604488dd837b9c4
SHA18df083f6509ec2b4d38a0a24a844b64129cb9763
SHA256834b565f173405f321437ee1b8fb496c0344f1339a50a40357864c0b2486d8cb
SHA5123be209166dab8a675befc31cddd92e35e6c52a53f46ab6a73cf149f030f7d8dd1aba4f89ac8eda71c84a2a76bfce3f5846ec484962c89bc923c3089e2aceaf4e
-
Filesize
68B
MD5b2e216b466317e21dc938dcc5183f38d
SHA17b8aa5d340f6e129a3def3273363cc172d22622f
SHA256b6693af03d8171440fc5fe4f4b9d659d396b30f4d6ebc9b58bef00d48cd97085
SHA5129ab39aac078606d526e8acaaf5851ef5243d0daa3096d053eca73cf86edeeb0fde1999f9e861d4d840b4bce464505fd7efac1db0f95039667b1a38950909a7c4
-
Filesize
368B
MD54a893d35935fc4d2e3fc833a2cc3d657
SHA1bceff8ef5670c0009da768d002ecec86bb2aca9a
SHA256b751211963cbc569367995a80c2b3b9c1e68f0046027000c8d91c40795d2576a
SHA5128ea50c33b238b9ab2184811fdb78f8313ce6264504d6440700c160c68924f6384f4511cfa5854feb17244fd1d97f64dde096f4604cb5011a9779ac0011f721d1
-
Filesize
2KB
MD5fd438357674ede5a130a44a45064338d
SHA1fbdceb6b3b3cc1fdb23516a992ce5cbba7c313fe
SHA256579efe03b622dab59f4c93bdc3a103efc9023bab5b19fa9addd8a9cfaea76705
SHA5121658c885fd71a5c1d042037aeecc638cd6ad74c96711ea5d2a5dfb90edfdbe2bd956d80deac876d76f227faefc39231619965100769f39d405599df9a20c8cad
-
Filesize
15KB
MD51560338db5246e4e5cc4a0de4847d80d
SHA11e74f45ff6976e01ea8e87a820eda8b9b807e18e
SHA2564fcf053ecee2352207f7a7e5951401da9f97924bc7ab06c0c54e5c8451882e54
SHA5129d4a13f08a7e2cdccaa0f1bbd891c01d66727fa7e8e76ca4f38ea0bf384927896e5a117d0855fc149099e1c1cea77e70ddbcf086f594b231ffcbdc0662c62f42