Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 18:02
Behavioral task
behavioral1
Sample
777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe
Resource
win10v2004-20240508-en
General
-
Target
777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe
-
Size
12.0MB
-
MD5
12cc724aa592230e7b53abc2ae617995
-
SHA1
3513aed93a9a899c1e1bbce88d91a4bfb645637e
-
SHA256
777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2
-
SHA512
2606bde859e2e534553284f0f960a9fb3b1f6fe5bee38929fcbd48881099e89e497c191b021bf55c2e0da6486bd962edef1f4d31c81870da29131203c5c33435
-
SSDEEP
393216:Jp2aafeDHntyT8XNaLuqSf8uVdwjy82OzS24nJ47yFNfqf:7MfWHl8sffTOWfn1Nf8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main 777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1028 777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe 1028 777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe 1028 777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe 1028 777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe 1028 777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe 2920 777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe 2920 777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1028 wrote to memory of 2920 1028 777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe 29 PID 1028 wrote to memory of 2920 1028 777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe 29 PID 1028 wrote to memory of 2920 1028 777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe 29 PID 1028 wrote to memory of 2920 1028 777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe"C:\Users\Admin\AppData\Local\Temp\777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe"C:\Users\Admin\AppData\Local\Temp\777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe" d2⤵
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD551ace1941fe6a6e56f604c573ca5e604
SHA137c2795d7d17c58c89ed407a4a9c98181d2614ef
SHA256d5eee7a884da0e1925a7d2c2ab47543c41fc20b9239fa5ace3e56017b33764b8
SHA51213e6e2a3b36a5b0af80c709375eb99e031408386874fabbc3e761af4c2c0a46d3fc657186d6937aabccb8fe39b9bf0e23fa7d2ccd8eb1beade50b8c7f19a85ec