Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 01:16
Static task
static1
Behavioral task
behavioral1
Sample
Photo1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Photo1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Photo2.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Photo2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
TConf.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
TConf.exe
Resource
win10v2004-20240508-en
General
-
Target
Photo1.exe
-
Size
37KB
-
MD5
134beec9243886fa1ae1fe09a2e8f0f2
-
SHA1
70c91c4ce17b56a193b2976343bb4885971a0414
-
SHA256
17230c5866d55f7c66039d773cc43132b4f02149bdff45bd396d41f08a2c0b45
-
SHA512
8a905e31c71720977574f7a488b61d976719580b2cb6dbdca0bc6914ccf254daac692899373fcaaddbc07dfaa997676e3cf8f5d5b81bf2c65c21d1a1e73aa398
-
SSDEEP
768:bX3pbhvZSjPrIHHVuLIFOXds2L6cJj3AD2DLy6cgDNCK1mMZ:t3Sr0HSPXdVLDpDLy6cgDNNr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2384 IEXPAND.EXE -
Executes dropped EXE 1 IoCs
pid Process 2384 IEXPAND.EXE -
Loads dropped DLL 2 IoCs
pid Process 2420 Photo1.exe 2420 Photo1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iexpand.exe = "iexpand.exe" Photo1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iexpand.exe = "iexpand.exe" IEXPAND.EXE -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\IEXPAND.EXE Photo1.exe File opened for modification C:\WINDOWS\SysWOW64\IEXPAND.EXE Photo1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2420 Photo1.exe 2420 Photo1.exe 2420 Photo1.exe 2384 IEXPAND.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2384 2420 Photo1.exe 30 PID 2420 wrote to memory of 2384 2420 Photo1.exe 30 PID 2420 wrote to memory of 2384 2420 Photo1.exe 30 PID 2420 wrote to memory of 2384 2420 Photo1.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Photo1.exe"C:\Users\Admin\AppData\Local\Temp\Photo1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\WINDOWS\SysWOW64\IEXPAND.EXE"C:\WINDOWS\SYSTEM32\IEXPAND.EXE" C:\Users\Admin\AppData\Local\Temp\Photo1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5134beec9243886fa1ae1fe09a2e8f0f2
SHA170c91c4ce17b56a193b2976343bb4885971a0414
SHA25617230c5866d55f7c66039d773cc43132b4f02149bdff45bd396d41f08a2c0b45
SHA5128a905e31c71720977574f7a488b61d976719580b2cb6dbdca0bc6914ccf254daac692899373fcaaddbc07dfaa997676e3cf8f5d5b81bf2c65c21d1a1e73aa398