Analysis
-
max time kernel
124s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
Trial.rar
Resource
win10v2004-20240611-en
General
-
Target
Trial.rar
-
Size
1.6MB
-
MD5
549b2c45e765ea8436bba2b01f9bd72e
-
SHA1
656ddffd4b13ffa8ed247432e05e0831434f531b
-
SHA256
52ffb84b69061310e020a2e51e76948bee9696ae949dd384beb977917340384d
-
SHA512
9f275e328241fba5a71cfc88b4f263227881d02e5f0d9e0565466f9fcf98ae74aa821646e5296be7f9174e76e207129493d64c48c9411db79da94c622592b610
-
SSDEEP
49152:hBuNpWbgbg5CcTNw94GQkk/dN2y7DqiW++aGR:h+pWbgbgtGCXJGEtW++aGR
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1636 space.exe 2284 space.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" space.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch space.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" space.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Software\Microsoft\Internet Explorer\IESettingSync space.exe Set value (int) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" space.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch space.exe Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" space.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Software\Microsoft\Internet Explorer\IESettingSync space.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1596 7zG.exe Token: 35 1596 7zG.exe Token: SeSecurityPrivilege 1596 7zG.exe Token: SeSecurityPrivilege 1596 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1596 7zG.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1640 OpenWith.exe 1636 space.exe 1636 space.exe 2284 space.exe 2284 space.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Trial.rar1⤵
- Modifies registry class
PID:1456
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1640
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4536
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\Trial\" -spe -an -ai#7zMap27940:90:7zEvent146721⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1596
-
C:\Users\Admin\AppData\Local\Temp\Trial\space.exe"C:\Users\Admin\AppData\Local\Temp\Trial\space.exe"1⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1636
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\5f667fe88da84a6896b2e720342e04df /t 4872 /p 16361⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\Trial\space.exe"C:\Users\Admin\AppData\Local\Temp\Trial\space.exe"1⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2284
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\666ad5651a8044fc84fdcfbae62b970d /t 3836 /p 22841⤵PID:3236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e54c2747b42b2630aff7bfa1721b4cd4
SHA12fa891538a85bd0266a55c84c7b8283e0dd2802d
SHA25654841ca1b259684cc962073a4be7f8dad786d33d94715a439f42c45674931609
SHA512a29c71b6dac68162d3ba497db2f7c2869e2eae7d31ee8a1fe73aad136323382526176950db5ca90da4cfb9021bab213f9f4810243b53b11e0f281f168ab6b23c
-
Filesize
15KB
MD5ca8cf40bb99275306d2f9d89b0f675ee
SHA15f682da0e3798f589f6ffe0d2b66720f4826c8b6
SHA2561c1455e2768a8a440481043fc64fbe1e6117cb39b646ce06d8a120c753eb6124
SHA512b7c1b694be2d9746432369f4b3515d681aa64d285f59ea47cd0044f3087ef26fe2bd31332c6f9a8bc8af662337d4d0b2551e0c03711c48307c58bc5ea0543376
-
Filesize
386B
MD5186a65581e2f29258f54d396660409fa
SHA16f998d3be2e85cb5419205f867135874f27c0a3a
SHA256e1e0974d0e8833375024eb7c78521b3b5cad4228aad22b23d506cbe702445844
SHA5127dea87b523aab01ea3c794779b71bc0b52179e1d5e7b9a45539ddd39c775969ef22853c4c193699aec1e3fa3cbe26e90e3a4881226c52a3aacae1eac260ff896
-
Filesize
1KB
MD5d1247757774200a3605149c9cc56f582
SHA19a5ab4c5e56de362eda0a3b764fc47e5c32248e3
SHA2563edfc2c8120d191feebaae0a493cc7fa6ab95d03f8a716fcb7b332cd2b03d446
SHA512b719c71ec99583421bd4d6a3791f609c844056b734fd22924ccf9ef0ccc4f20801e1e33b4a302c18f1081e90da737539ceb42af73c1b6e24632d204efb196d31
-
Filesize
27KB
MD58a3086f6c6298f986bda09080dd003b1
SHA18c7d41c586bfa015fb5cc50a2fdc547711b57c3c
SHA2560512d9ed3e5bb3daef94aa5c16a6c3e2ee26ffed9de00d1434ffe46a027b16b9
SHA5129e586742f4e19938132e41145deec584a7b8c7e111b3c6e9254f8d11db632ebe4d66898458ed7bcfc0614d06e20eb33d5a6a8eb8b32d91110557255cf1dbf017
-
Filesize
7B
MD5260ca9dd8a4577fc00b7bd5810298076
SHA153a5687cb26dc41f2ab4033e97e13adefd3740d6
SHA256aee408847d35e44e99430f0979c3357b85fe8dbb4535a494301198adbee85f27
SHA51251e85deb51c2b909a21ec5b8e83b1cb28da258b1be227620105a345a2bd4c6aea549cd5429670f2df33324667b9f623a420b3a0bdbbd03ad48602211e75478a7
-
Filesize
139KB
MD5691a71bc11dda217a63e66c5ae34ff1e
SHA16b52745d1c7adc436b77fe387c19bc685ab4c5b1
SHA256745c2a5599add0d27cfa4c2401c6a0ab7a7c9450b78d7766e1204dc65347d9e6
SHA512f37100ae770077b854e6d53c596aff56e006ed68869dd12dcf206942d44c3b511767418e2a29a0f887d1bdd5776fd5e6114cdaaf6a00d224a17c7c892ce465af