Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 15:10
Static task
static1
Behavioral task
behavioral1
Sample
67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe
Resource
win10v2004-20240412-en
General
-
Target
67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe
-
Size
1.5MB
-
MD5
f4bb1ea5d7126ac2a0c84858daf5b8bc
-
SHA1
4b194f817d81b599669373eaa6757ac03f6b5eff
-
SHA256
67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75
-
SHA512
ecd12856f72fd6b7fc3faff994e8b1fc8b0d8bea378bead421e735b47a69fc690b0c18ec98cc7d3812eb1dc70cd00ee7123690bf2a8dc979a672d8eb153e284b
-
SSDEEP
24576:ZsqiKUgGtZeTq/SI0w80/24PHfZVt+xd3vopBcef8N7SF/4ErHBkBcM2lE4ZEbLM:aWA8na3Zfo7RErhplEmbTkM
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini 67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main 67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl 67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe = "11000" 67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION 67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2484 67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe 2484 67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2484 67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe 2484 67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe 2484 67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe 2484 67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe 2484 67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe"C:\Users\Admin\AppData\Local\Temp\67e477fac2ec40d5725e711fb6b0c02bb7084416bdcdf038ffaf2c9a93434d75.exe"1⤵
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790