Analysis
-
max time kernel
150s -
max time network
186s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
382db96e1f5b85751ad6beb6069f63ce.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
382db96e1f5b85751ad6beb6069f63ce.exe
Resource
win10v2004-20240226-en
General
-
Target
382db96e1f5b85751ad6beb6069f63ce.exe
-
Size
91KB
-
MD5
382db96e1f5b85751ad6beb6069f63ce
-
SHA1
ba27e811a389259f5bcdf85b19dc8a9e73dae430
-
SHA256
87ee67f1e78c16eada84ac5556ab89e362b981e1eee451847b24dafc75407d52
-
SHA512
cb4445cfe57c34cc66de8c272f0c5f72441e953969b784b1291d104d085d98c8edb275db85eccf9fe30544ebf16844362dff91a7203ccaa1605dbb7afa965700
-
SSDEEP
1536:sS19M28horJ1ZwaoP854fw163usin62EGUMCvx6U:sSPr8GJ1ZK64fy63u/6LG2N
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 382db96e1f5b85751ad6beb6069f63ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MicrosoftCorp = "C:\\WINDOWS\\system32\\securebind.exe" 382db96e1f5b85751ad6beb6069f63ce.exe -
Executes dropped EXE 2 IoCs
pid Process 2700 securebind.exe 2564 securebind.exe -
Loads dropped DLL 3 IoCs
pid Process 1040 382db96e1f5b85751ad6beb6069f63ce.exe 1040 382db96e1f5b85751ad6beb6069f63ce.exe 2700 securebind.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MicrosoftNAPC = "C:\\WINDOWS\\system32\\securebind.exe" 382db96e1f5b85751ad6beb6069f63ce.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\securebind.exe securebind.exe File created C:\WINDOWS\SysWOW64\securebind.exe securebind.exe File created C:\WINDOWS\SysWOW64\securebind.exe 382db96e1f5b85751ad6beb6069f63ce.exe File opened for modification C:\WINDOWS\SysWOW64\securebind.exe 382db96e1f5b85751ad6beb6069f63ce.exe File opened for modification C:\WINDOWS\SysWOW64\securebind.exe securebind.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2944 set thread context of 1040 2944 382db96e1f5b85751ad6beb6069f63ce.exe 28 PID 2700 set thread context of 2564 2700 securebind.exe 30 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2944 382db96e1f5b85751ad6beb6069f63ce.exe 2700 securebind.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2944 wrote to memory of 1040 2944 382db96e1f5b85751ad6beb6069f63ce.exe 28 PID 2944 wrote to memory of 1040 2944 382db96e1f5b85751ad6beb6069f63ce.exe 28 PID 2944 wrote to memory of 1040 2944 382db96e1f5b85751ad6beb6069f63ce.exe 28 PID 2944 wrote to memory of 1040 2944 382db96e1f5b85751ad6beb6069f63ce.exe 28 PID 2944 wrote to memory of 1040 2944 382db96e1f5b85751ad6beb6069f63ce.exe 28 PID 2944 wrote to memory of 1040 2944 382db96e1f5b85751ad6beb6069f63ce.exe 28 PID 2944 wrote to memory of 1040 2944 382db96e1f5b85751ad6beb6069f63ce.exe 28 PID 2944 wrote to memory of 1040 2944 382db96e1f5b85751ad6beb6069f63ce.exe 28 PID 2944 wrote to memory of 1040 2944 382db96e1f5b85751ad6beb6069f63ce.exe 28 PID 1040 wrote to memory of 2700 1040 382db96e1f5b85751ad6beb6069f63ce.exe 29 PID 1040 wrote to memory of 2700 1040 382db96e1f5b85751ad6beb6069f63ce.exe 29 PID 1040 wrote to memory of 2700 1040 382db96e1f5b85751ad6beb6069f63ce.exe 29 PID 1040 wrote to memory of 2700 1040 382db96e1f5b85751ad6beb6069f63ce.exe 29 PID 2700 wrote to memory of 2564 2700 securebind.exe 30 PID 2700 wrote to memory of 2564 2700 securebind.exe 30 PID 2700 wrote to memory of 2564 2700 securebind.exe 30 PID 2700 wrote to memory of 2564 2700 securebind.exe 30 PID 2700 wrote to memory of 2564 2700 securebind.exe 30 PID 2700 wrote to memory of 2564 2700 securebind.exe 30 PID 2700 wrote to memory of 2564 2700 securebind.exe 30 PID 2700 wrote to memory of 2564 2700 securebind.exe 30 PID 2700 wrote to memory of 2564 2700 securebind.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\382db96e1f5b85751ad6beb6069f63ce.exe"C:\Users\Admin\AppData\Local\Temp\382db96e1f5b85751ad6beb6069f63ce.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\382db96e1f5b85751ad6beb6069f63ce.exe
- Adds policy Run key to start application
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\WINDOWS\SysWOW64\securebind.exe"C:\WINDOWS\system32\securebind.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\WINDOWS\SysWOW64\securebind.exe
- Executes dropped EXE
- Drops file in System32 directory
PID:2564
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5382db96e1f5b85751ad6beb6069f63ce
SHA1ba27e811a389259f5bcdf85b19dc8a9e73dae430
SHA25687ee67f1e78c16eada84ac5556ab89e362b981e1eee451847b24dafc75407d52
SHA512cb4445cfe57c34cc66de8c272f0c5f72441e953969b784b1291d104d085d98c8edb275db85eccf9fe30544ebf16844362dff91a7203ccaa1605dbb7afa965700