Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 15:25
Static task
static1
Behavioral task
behavioral1
Sample
Appdater.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Appdater.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Uninstall.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
render.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
render.exe
Resource
win10v2004-20240508-en
General
-
Target
Appdater.exe
-
Size
3.4MB
-
MD5
c163cdba001008bfeebab14dce7a5875
-
SHA1
e6eea0b04e221f491d70a3d910d5cda55ead43ec
-
SHA256
3847d0e464b8ed843f973c3609935fa03571936377f54e09424fc421ddc0afb4
-
SHA512
6f0b370c96179dd11b26d2f57b932a4ba24421c48a73f84ac0d18caa6963ce1636425a28ce74b2d0b9dae04dc9865f50b5f25abee55c60f01920e734d55efe80
-
SSDEEP
49152:a5APhegSLUTwIve1dkQPG35ZTwqk+bwLUd9Si3inY9:lfwIv+G357ZUwiC
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Appdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main Appdater.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DOMStorage\127.0.0.1 Appdater.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DOMStorage Appdater.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DOMStorage\127.0.0.1\NumberOfSubdomains = "1" Appdater.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe 2484 Appdater.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5cbcab293d3f03b8de988ade5f6fbec41
SHA13427095090e2240cc62778d8529f3143c0f4911e
SHA2566f8dc4e3d2d51f86d3fb9d203d8d2a1d4537f414cf911ad98dcd57b15c69e1a5
SHA512042920d4165234d20ebf91559019b1c6e915b0757c73a3d3f2aedebc32e73194e08973ab8737cc1ae2ce800043d0984188d62c8978774b3e1481fa3e1d1ce614