Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe
Resource
win7-20240221-en
General
-
Target
90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe
-
Size
192KB
-
MD5
5ef571b6a4f2ff6300f3a3b50bfd0632
-
SHA1
9360645cf56f7b512046a2734fdc845bedbe6742
-
SHA256
90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b
-
SHA512
b553c9637b09cd7e11984e5e532a412601ba149ad0af5168be54273dbb9750fa43133e9c71264de9cae423f55394b7ad7051f067928e957f003726c8cad16a58
-
SSDEEP
3072:5Mvj+eIAbeWsy7hy/049Vem7l2fySg7+ehmIHELhxVy/5/YoayJ8gCy6IKxzQy:+vj2AbeWsy204rLlKlk+HIqhxVyhweAg
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
caseasp.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat caseasp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 18 IoCs
Processes:
caseasp.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings caseasp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-1f-ed-c7-3d-d3\WpadDecision = "0" caseasp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7399F84-C8E4-4D19-977A-80288B7A82AB}\WpadDecision = "0" caseasp.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7399F84-C8E4-4D19-977A-80288B7A82AB}\WpadNetworkName = "Network 3" caseasp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 caseasp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" caseasp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7399F84-C8E4-4D19-977A-80288B7A82AB}\WpadDecisionReason = "1" caseasp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7399F84-C8E4-4D19-977A-80288B7A82AB}\ce-1f-ed-c7-3d-d3 caseasp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-1f-ed-c7-3d-d3\WpadDecisionReason = "1" caseasp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-1f-ed-c7-3d-d3\WpadDecisionTime = 207ca0f641a9da01 caseasp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections caseasp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 caseasp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7399F84-C8E4-4D19-977A-80288B7A82AB}\WpadDecisionTime = 207ca0f641a9da01 caseasp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{A7399F84-C8E4-4D19-977A-80288B7A82AB} caseasp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\ce-1f-ed-c7-3d-d3 caseasp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings caseasp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad caseasp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f011c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 caseasp.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.execaseasp.execaseasp.exepid process 3000 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe 2828 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe 2636 caseasp.exe 2552 caseasp.exe 2552 caseasp.exe 2552 caseasp.exe 2552 caseasp.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exepid process 2828 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.execaseasp.exedescription pid process target process PID 3000 wrote to memory of 2828 3000 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe PID 3000 wrote to memory of 2828 3000 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe PID 3000 wrote to memory of 2828 3000 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe PID 3000 wrote to memory of 2828 3000 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe 90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe PID 2636 wrote to memory of 2552 2636 caseasp.exe caseasp.exe PID 2636 wrote to memory of 2552 2636 caseasp.exe caseasp.exe PID 2636 wrote to memory of 2552 2636 caseasp.exe caseasp.exe PID 2636 wrote to memory of 2552 2636 caseasp.exe caseasp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe"C:\Users\Admin\AppData\Local\Temp\90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe"C:\Users\Admin\AppData\Local\Temp\90152e847d02fe9ed6802bf437c89bbad41abfc0b9552c5c75f7432541e8e94b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2828
-
C:\Windows\SysWOW64\caseasp.exe"C:\Windows\SysWOW64\caseasp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\caseasp.exe"C:\Windows\SysWOW64\caseasp.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2552