Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
de70357e6ce05924ca36659f1da1de01.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de70357e6ce05924ca36659f1da1de01.exe
Resource
win10v2004-20240226-en
General
-
Target
de70357e6ce05924ca36659f1da1de01.exe
-
Size
11.0MB
-
MD5
de70357e6ce05924ca36659f1da1de01
-
SHA1
b84a74b5472d8d1382d95c0e75cdecaacc224f6f
-
SHA256
bae223bf684420bf6db0b96124cf5659706cb24ff9f6a5e12977eab9b448688b
-
SHA512
4612bfcbe7f32f6a31f6f267d72d4f3e1a699d680c99189c6d3057de71f8ef9a53ab92c77d473e31ae7117f75a5a6f039b5514c417f1c3aaf1a291dd01e10b59
-
SSDEEP
49152:EQFRHrmQG+yrV2FhrV2FUQG+yrV2FIFUYsrV2CrV2FhrV2FUQG+yrVL0Fhr5rV24:EcKQ1HK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2096 n.exe -
Loads dropped DLL 2 IoCs
pid Process 1948 de70357e6ce05924ca36659f1da1de01.exe 1948 de70357e6ce05924ca36659f1da1de01.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main n.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 n.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2096 n.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2096 n.exe 2096 n.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2096 1948 de70357e6ce05924ca36659f1da1de01.exe 28 PID 1948 wrote to memory of 2096 1948 de70357e6ce05924ca36659f1da1de01.exe 28 PID 1948 wrote to memory of 2096 1948 de70357e6ce05924ca36659f1da1de01.exe 28 PID 1948 wrote to memory of 2096 1948 de70357e6ce05924ca36659f1da1de01.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\de70357e6ce05924ca36659f1da1de01.exe"C:\Users\Admin\AppData\Local\Temp\de70357e6ce05924ca36659f1da1de01.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\n.exeC:\Users\Admin\AppData\Local\Temp\n.exe -run C:\Users\Admin\AppData\Local\Temp\de70357e6ce05924ca36659f1da1de01.exe2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5c069f0845916707d4f2b44f5cc13bf11
SHA1ee0553d33439ad60219b9053b90f5bb0d15e8db5
SHA256d55452530846bd3ae19bdcea38b0b050cbfa6855ee99de715f752dd3d795f72a
SHA512a3786ef753ac55eacaee8bfc9ffd26e813ab682b10b173d9b803c77c869935c4181b084f7d5d7e0988d91d42f9069dc9b2641e7f2edca49f54caa352b0e983b1
-
Filesize
327KB
MD5b54e09346b3dd4b4d7585eae686151e5
SHA1790a4f0e58068407d55f3722a7921a05f6708cf2
SHA2569ee18f7b79a6bdb48c4fa82dfb66fb9831d98cbf054640cade637d54c3829dcc
SHA512f5530d9c133b1dcb31f4eec94c6a08fba668ff5d965071c498cfb746cdd4cc58d58316604af44a80cd895feadde398a10e13cf4cbaaa980d9ca84e49fdff37ff
-
Filesize
206KB
MD5573abea3a11c82f1080564e20da7c903
SHA14ebe1000b4bc56765cf7e0ce4e7525079da454ad
SHA256cc4fe8a1916b18e1c4ed28a5141541e5dbcd47aaa27cb459f5d655f2513ea1f6
SHA512aab295b99088319a85d00ae65bafd384c9ecb4a2c6508b998dcf44b4b2246f0770df2ff24cb50ac2216dfb5831cbb21d8a58874da1bce98c73cf6355fd3f5bdb
-
Filesize
488KB
MD53a0c3af8b659837703a297d6b01792c1
SHA148f9047d9f17899c0638d9d36afdb1e5a8ac71e9
SHA2569d5f4dd282a891989b65b20c0a48ce14b3e7c4035da41491a2da9d6f6e4347cf
SHA512e6887268d93dd7fd4ad0ddcab08236637c356160f61ef930cb6172091733c38dd6b4f359c51dc40f8078bbb9f2812787777f8806b1ff6fb3ddd8b758b81e1938
-
Filesize
181KB
MD51a5d769b856c63620796b086f114d8fe
SHA1822edec384f540e63c68fcc3e9120466dca06896
SHA256a6fcdcfe3b933ef39be2e35443cebc3dea9496ac76aafcce856a10e9e9a29c8e
SHA512afbe6aaf7a32a24f323a3b79756e4122d1dd21bffc433d97c7d238a38105a55655155f68a5bf9a9735fe10b2b00e731c73cc868625dcc11e9c479c8b8ef4c782