Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 05:19
Behavioral task
behavioral1
Sample
f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f.exe
Resource
win7-20240220-en
General
-
Target
f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f.exe
-
Size
184KB
-
MD5
23200d05e67026e395f5508e81a6f261
-
SHA1
84c0011593696bc6cb3fcfe57edf5eb4fbf8b4a5
-
SHA256
f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f
-
SHA512
92ca46a53238d28c98c6b16ac075d1c81534408e0f10a04de8195c6e26ee735e5af2d78b05357fac0d58c9b452e0d670ed60d3040fd29fb95a40cea56e47e5d6
-
SSDEEP
1536:Eq37dumBoEHkqWke1C4kqUDA2n6J8U6FjSHyI9Ng3Xmx:n35PBoEW1TBUP6n6FWlXi
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
Processes:
f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f.exestartup.batdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f.exe Set value (int) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" startup.bat -
Executes dropped EXE 2 IoCs
Processes:
startup.batstartup.batpid process 1012 startup.bat 2252 startup.bat -
Processes:
resource yara_rule behavioral2/memory/3944-0-0x0000000000400000-0x000000000042E000-memory.dmp upx C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\startup.bat upx behavioral2/memory/3944-10-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/2252-14-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/memory/1012-15-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
Processes:
startup.batdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings startup.bat Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell startup.bat Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU startup.bat Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots startup.bat Set value (data) \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff startup.bat -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f.exestartup.batstartup.batpid process 3944 f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f.exe 1012 startup.bat 2252 startup.bat -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f.exestartup.batdescription pid process target process PID 3944 wrote to memory of 1012 3944 f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f.exe startup.bat PID 3944 wrote to memory of 1012 3944 f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f.exe startup.bat PID 3944 wrote to memory of 1012 3944 f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f.exe startup.bat PID 1012 wrote to memory of 2252 1012 startup.bat startup.bat PID 1012 wrote to memory of 2252 1012 startup.bat startup.bat PID 1012 wrote to memory of 2252 1012 startup.bat startup.bat
Processes
-
C:\Users\Admin\AppData\Local\Temp\f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f.exe"C:\Users\Admin\AppData\Local\Temp\f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\startup.bat"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\startup.bat"2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\startup.bat"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\startup.bat"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\startup.batFilesize
184KB
MD523200d05e67026e395f5508e81a6f261
SHA184c0011593696bc6cb3fcfe57edf5eb4fbf8b4a5
SHA256f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f
SHA51292ca46a53238d28c98c6b16ac075d1c81534408e0f10a04de8195c6e26ee735e5af2d78b05357fac0d58c9b452e0d670ed60d3040fd29fb95a40cea56e47e5d6
-
memory/1012-15-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2252-14-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3944-0-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/3944-10-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB