Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 05:59
Static task
static1
Behavioral task
behavioral1
Sample
382db96e1f5b85751ad6beb6069f63ce.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
382db96e1f5b85751ad6beb6069f63ce.exe
Resource
win10v2004-20240226-en
General
-
Target
382db96e1f5b85751ad6beb6069f63ce.exe
-
Size
91KB
-
MD5
382db96e1f5b85751ad6beb6069f63ce
-
SHA1
ba27e811a389259f5bcdf85b19dc8a9e73dae430
-
SHA256
87ee67f1e78c16eada84ac5556ab89e362b981e1eee451847b24dafc75407d52
-
SHA512
cb4445cfe57c34cc66de8c272f0c5f72441e953969b784b1291d104d085d98c8edb275db85eccf9fe30544ebf16844362dff91a7203ccaa1605dbb7afa965700
-
SSDEEP
1536:sS19M28horJ1ZwaoP854fw163usin62EGUMCvx6U:sSPr8GJ1ZK64fy63u/6LG2N
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 382db96e1f5b85751ad6beb6069f63ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MicrosoftCorp = "C:\\WINDOWS\\system32\\securebind.exe" 382db96e1f5b85751ad6beb6069f63ce.exe -
Executes dropped EXE 2 IoCs
pid Process 3212 securebind.exe 2928 securebind.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicrosoftNAPC = "C:\\WINDOWS\\system32\\securebind.exe" 382db96e1f5b85751ad6beb6069f63ce.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\securebind.exe 382db96e1f5b85751ad6beb6069f63ce.exe File opened for modification C:\WINDOWS\SysWOW64\securebind.exe securebind.exe File opened for modification C:\WINDOWS\SysWOW64\securebind.exe securebind.exe File created C:\WINDOWS\SysWOW64\securebind.exe securebind.exe File created C:\WINDOWS\SysWOW64\securebind.exe 382db96e1f5b85751ad6beb6069f63ce.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 464 set thread context of 2472 464 382db96e1f5b85751ad6beb6069f63ce.exe 88 PID 3212 set thread context of 2928 3212 securebind.exe 90 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 464 382db96e1f5b85751ad6beb6069f63ce.exe 3212 securebind.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 464 wrote to memory of 2472 464 382db96e1f5b85751ad6beb6069f63ce.exe 88 PID 464 wrote to memory of 2472 464 382db96e1f5b85751ad6beb6069f63ce.exe 88 PID 464 wrote to memory of 2472 464 382db96e1f5b85751ad6beb6069f63ce.exe 88 PID 464 wrote to memory of 2472 464 382db96e1f5b85751ad6beb6069f63ce.exe 88 PID 464 wrote to memory of 2472 464 382db96e1f5b85751ad6beb6069f63ce.exe 88 PID 464 wrote to memory of 2472 464 382db96e1f5b85751ad6beb6069f63ce.exe 88 PID 464 wrote to memory of 2472 464 382db96e1f5b85751ad6beb6069f63ce.exe 88 PID 464 wrote to memory of 2472 464 382db96e1f5b85751ad6beb6069f63ce.exe 88 PID 2472 wrote to memory of 3212 2472 382db96e1f5b85751ad6beb6069f63ce.exe 89 PID 2472 wrote to memory of 3212 2472 382db96e1f5b85751ad6beb6069f63ce.exe 89 PID 2472 wrote to memory of 3212 2472 382db96e1f5b85751ad6beb6069f63ce.exe 89 PID 3212 wrote to memory of 2928 3212 securebind.exe 90 PID 3212 wrote to memory of 2928 3212 securebind.exe 90 PID 3212 wrote to memory of 2928 3212 securebind.exe 90 PID 3212 wrote to memory of 2928 3212 securebind.exe 90 PID 3212 wrote to memory of 2928 3212 securebind.exe 90 PID 3212 wrote to memory of 2928 3212 securebind.exe 90 PID 3212 wrote to memory of 2928 3212 securebind.exe 90 PID 3212 wrote to memory of 2928 3212 securebind.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\382db96e1f5b85751ad6beb6069f63ce.exe"C:\Users\Admin\AppData\Local\Temp\382db96e1f5b85751ad6beb6069f63ce.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\382db96e1f5b85751ad6beb6069f63ce.exe
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\WINDOWS\SysWOW64\securebind.exe"C:\WINDOWS\system32\securebind.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\WINDOWS\SysWOW64\securebind.exe
- Executes dropped EXE
- Drops file in System32 directory
PID:2928
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5382db96e1f5b85751ad6beb6069f63ce
SHA1ba27e811a389259f5bcdf85b19dc8a9e73dae430
SHA25687ee67f1e78c16eada84ac5556ab89e362b981e1eee451847b24dafc75407d52
SHA512cb4445cfe57c34cc66de8c272f0c5f72441e953969b784b1291d104d085d98c8edb275db85eccf9fe30544ebf16844362dff91a7203ccaa1605dbb7afa965700