Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-06-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe
Resource
win10v2004-20240508-en
General
-
Target
a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe
-
Size
4.8MB
-
MD5
39490d6ae5b10a8cdffecd71d05141dd
-
SHA1
450da6260c6817aca8d9444831a48439ba45785c
-
SHA256
a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb
-
SHA512
7ffb9cb6a53cf233b6ff396eeb6193e683aed75001b3f73a1bbadaeec3ff7dcbce9b7e215d1743a4374e488185b824b90dde4afe93a8d93608b6340af07c14fb
-
SSDEEP
98304:rcAf/HlqfEBwysMKalG8zzgg+t2TIJIX3gGKV0wMa8/FJjVBl5+pEs:rr/lqfEBwlMllPzzp+t2540w0jjVP5A
Malware Config
Signatures
-
Checks for any installed AV software in registry 1 TTPs 5 IoCs
Processes:
a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\AVAST Software\Avast\Version a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\AVAST Software\Avast\Version a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Avira a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avira a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe Key opened \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\AVAST Software\Avast a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exepid process 1724 a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe 1724 a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe 1724 a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe 1724 a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe 1724 a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe 1724 a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe 1724 a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe 1724 a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe 1724 a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe 1724 a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe 1724 a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe 1724 a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exepid process 1724 a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe 1724 a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe"C:\Users\Admin\AppData\Local\Temp\a9427d47bf1cfadd009990ca09feb2af88823f5908b17e2afa70c8c49c95b3eb.exe"1⤵
- Checks for any installed AV software in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\pixelsee-installer-tmp\Montserrat-Bold.eotFilesize
256KB
MD50f722e725ac50271f9d6db477e8c0d17
SHA1d34259cfe05b2ba9c9e5256a3ce513d4bc5afbe8
SHA2567615a4bb88a5680cfead49c1774013ce48c4c7343cb82d7585f7935c705400b0
SHA5129a58e7d1537f28f19dc6e63b36d422748d851b68a8b3eedf69f531d502d9163e41f4d9cc9d782fd6fc70fab269f04dc9907422bd80f5dd265edcc0ae6bddc77a
-
C:\Users\Admin\AppData\Local\Temp\pixelsee-installer-tmp\Montserrat-Regular.eotFilesize
314KB
MD52dd0a1de870af34d48d43b7cad82b8d9
SHA1440f4f1fdf17a5c8b426ac6bd4535b8fe5258c7e
SHA256057bc6c47c47aaccdf31adc48a6b401f6090a02c28e354099eff80907dc2af32
SHA51283df193ab984037b940876bf6371020b4bb13af74e988abb8ad6a30d48ab6cd9dc5c08937e58abab93278cc85c9d79c373688b2c51c035fdeffed639c933e8ff
-
C:\Users\Admin\AppData\Local\Temp\pixelsee-installer-tmp\Roboto-Regular.eotFilesize
176KB
MD5b9077621ce786b55c176a61456bfc077
SHA15f164e1bc0b6573bac876e38ca1bb2e60ff0627e
SHA2566cedf381d59fa4caabfb836e9a3720420645cbcea32491a5ac5f07cf274ceac6
SHA512b1f2c599804a2d0ac51d3adfe7b2d0a21c5fa1e3d8d83d932f42d30bfd26aad5972d96555097a60f8fdc4d34ed24bad2876a89cf0b27b8cd01c72c0ba8f4d02a
-
C:\Users\Admin\AppData\Local\Temp\pixelsee-installer-tmp\img2\main-icon-big.pngFilesize
975B
MD50e5fea82cc4f4a8225532e5b2f45c6c8
SHA1b163d952a4a5b0c3ea40da2b47f95e624e344c96
SHA25681b5f50491579127d13e050847ef6d817265ab4b70d2796fb74021463b778bb9
SHA512051507296cd4d51ce4d34f0d1dd0a078f7598645ec42321335cec5719152c05dc611c663c67b3265e3baf14fd6e0c93788e2d0b04c6e5c16f4203dbd206b3f44
-
C:\Users\Admin\AppData\Local\Temp\pixelsee-installer-tmp\index.htmlFilesize
32KB
MD591400b2119f89b8b1714bd4559590fdc
SHA10b5a10065fc35b34dc128d43d570f7c7b6c3960f
SHA256e01627f942e2139c70affbd89a7ce70bb3c9be0feef25ae446125916504a0269
SHA512e05f2af8535bc43fab18e262fa69620f3ed074143251ece8e567698e748e7e03a6b22f450911734d0d62246485051b454df8bc69528b36195496f664aa2dbedc
-
C:\Users\Admin\AppData\Local\Temp\pixelsee-installer-tmp\js\jquery-ui.min.1.8.0.jsFilesize
202KB
MD5a4fdd77e182bd2fabe300a47b5617a35
SHA1e002b335c75b5edefcd251962f61f53a2ab8e0f2
SHA2568b59592d67eadc703af6cdd5ba8d077f9f9485d01fb6405555614335f89be99b
SHA512ddcccde1c129f8f71fb39685abc615c4202b8b3dfc12cedd7d9cca2f97b308fc14b64497826421fa9df3d1cf54bdae9c085051af0a8d393cd3d556a6578d4085
-
C:\Users\Admin\AppData\Local\Temp\pixelsee-installer-tmp\js\jquery.min.1.6.4.jsFilesize
89KB
MD5ea75b2a8f1b4241a872b1cbddbaed154
SHA118678dd78c1f5a3525127b442bc70375faf09c16
SHA2564a62927a380e201c4ee51321dcc1e6b1f7dfbf82049cf349df990629e01e9178
SHA512dc69cd4703dcba3c8f4a52058c44a34fa7c0b6096bed20f30ce3dab872461eb6dda9d0d381137b9cb022219ad92ca7f5f25d3964ed33d5f41e9fc05efa5330fd
-
C:\Users\Admin\AppData\Local\Temp\pixelsee-installer-tmp\preloader.htmlFilesize
826B
MD537a05031bec9d3e093388407848af66f
SHA15b48a5b72097ad98eacf54e956e94d26710a0493
SHA256cf38f4f8663028beff3a7650a9d426b4116891e8547029b66b8d2a13fad63a48
SHA512db3af55b93e901778a74f462af1f80a3e4181b251b061f858a3a6dadc77f2eaf4760c30f4ef9ae5560418eadb6133d474289c3b84c0e89615670af722d8dab9f
-
memory/1724-0-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/1724-207-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB