Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 03:40
Static task
static1
Behavioral task
behavioral1
Sample
d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe
Resource
win10v2004-20240412-en
General
-
Target
d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe
-
Size
76KB
-
MD5
0dcb0d02d9af6e83917f15001a6593ac
-
SHA1
9c9ae95450ed07b74cd9967dea99bddfea510ed2
-
SHA256
d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c
-
SHA512
9fa1ccc0a40eb95efd75b068093b62f5d9b287ae5519cce4704e016c368d66f43f22e796f940e8fd8dae43624af8105b9524eb92341a8306f4d69c53218e5b13
-
SSDEEP
768:XT6VvEq1mDMnY+1j4I4SccFhqmvdgxXGcZDxc7mdKnI/:XC1mAnV1U2c+qHhPZDW
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
Processes:
Admin.exed2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe -
Executes dropped EXE 1 IoCs
Processes:
Admin.exepid process 1304 Admin.exe -
Loads dropped DLL 2 IoCs
Processes:
d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exepid process 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exeAdmin.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exeAdmin.exepid process 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1304 Admin.exe 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe 1304 Admin.exe 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe 1304 Admin.exe 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe 1304 Admin.exe 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe 1304 Admin.exe 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe 1304 Admin.exe 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe 1304 Admin.exe 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe 1304 Admin.exe 1304 Admin.exe 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe 1304 Admin.exe 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe 1304 Admin.exe 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe 1304 Admin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exeAdmin.exepid process 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe 1304 Admin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exedescription pid process target process PID 1256 wrote to memory of 1304 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe Admin.exe PID 1256 wrote to memory of 1304 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe Admin.exe PID 1256 wrote to memory of 1304 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe Admin.exe PID 1256 wrote to memory of 1304 1256 d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe Admin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe"C:\Users\Admin\AppData\Local\Temp\d2577bf4f1b2f2313965eda4dcb2cd31bb390965e1d687c0da5e561ff0e4bc7c.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5fac2204896b146f56def0477a5d40397
SHA1eba4c1060556c2c1678f2bcc0b8b171f01a0cf6c
SHA2569773f2b8cd348cc17a8eb65d1a0ba867149fc291c3b2303451a7503dd221f99a
SHA512f093a11b5ff63b55dfdbcc0da2772ec32112081fd9d98f3a39fd9f7eafd7db7efe1e65c8ce69c1d0248170ed4fb043726eda75971447fc2d5f2c76b45b3d9bd8