Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
e1ad47fd11cc436724bc14b36bbeba5c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1ad47fd11cc436724bc14b36bbeba5c.exe
Resource
win10v2004-20240319-en
General
-
Target
e1ad47fd11cc436724bc14b36bbeba5c.exe
-
Size
34KB
-
MD5
e1ad47fd11cc436724bc14b36bbeba5c
-
SHA1
76f82df0717916d7751fe445ff24b1c5f612905e
-
SHA256
7de6641b4973aba43cf4bbae3ce66e54620c3a44bdae7e8d2f3a03782498ae23
-
SHA512
d3fc5e7ec78a12c3d290278c9d47195b368f8123e0e0075295e0f5426aa8dcd55926321208d4061a0b582badef9cb834764789c65e30cdd08fd8b910747d9d7f
-
SSDEEP
768:87lDTSjNrRZqMD+vMjpNZ14ZA/LwvRUiPxEDE4OpvXj:8dSjNrRZOvMF1mUwvWgbVpPj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2668 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1232 internet0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\internet = "C:\\Windows\\internet0.exe" e1ad47fd11cc436724bc14b36bbeba5c.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\internet0.exe e1ad47fd11cc436724bc14b36bbeba5c.exe File opened for modification C:\Windows\internet0.exe e1ad47fd11cc436724bc14b36bbeba5c.exe File opened for modification C:\Windows\internet0.dll internet0.exe File created C:\Windows\internet0.dll internet0.exe File created C:\Windows\Deleteme.bat e1ad47fd11cc436724bc14b36bbeba5c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe 1232 internet0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1232 internet0.exe 1232 internet0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1232 2352 e1ad47fd11cc436724bc14b36bbeba5c.exe 28 PID 2352 wrote to memory of 1232 2352 e1ad47fd11cc436724bc14b36bbeba5c.exe 28 PID 2352 wrote to memory of 1232 2352 e1ad47fd11cc436724bc14b36bbeba5c.exe 28 PID 2352 wrote to memory of 1232 2352 e1ad47fd11cc436724bc14b36bbeba5c.exe 28 PID 2352 wrote to memory of 2668 2352 e1ad47fd11cc436724bc14b36bbeba5c.exe 29 PID 2352 wrote to memory of 2668 2352 e1ad47fd11cc436724bc14b36bbeba5c.exe 29 PID 2352 wrote to memory of 2668 2352 e1ad47fd11cc436724bc14b36bbeba5c.exe 29 PID 2352 wrote to memory of 2668 2352 e1ad47fd11cc436724bc14b36bbeba5c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1ad47fd11cc436724bc14b36bbeba5c.exe"C:\Users\Admin\AppData\Local\Temp\e1ad47fd11cc436724bc14b36bbeba5c.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\internet0.exeC:\Windows\internet0.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1232
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Deleteme.bat2⤵
- Deletes itself
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5c3028c542b6cffe0d98f3667e957b5f6
SHA1e1aa49bb688c4ae6acc8df08421b51a3084484dd
SHA2565bf5489fd73224a4c41f900734e93b1399b06aed67ef4eef4a7985c25fd36499
SHA512ead95622ca0590bfd47bbfe292cf97c3b1f97972b019de4adf961c4150adcbe206c0db70bdffd713ea0e910941e92d16951e7739d7152490221025b03aec5a10
-
Filesize
34KB
MD5e1ad47fd11cc436724bc14b36bbeba5c
SHA176f82df0717916d7751fe445ff24b1c5f612905e
SHA2567de6641b4973aba43cf4bbae3ce66e54620c3a44bdae7e8d2f3a03782498ae23
SHA512d3fc5e7ec78a12c3d290278c9d47195b368f8123e0e0075295e0f5426aa8dcd55926321208d4061a0b582badef9cb834764789c65e30cdd08fd8b910747d9d7f