Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 01:00
Static task
static1
Behavioral task
behavioral1
Sample
02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe
Resource
win10v2004-20240802-en
General
-
Target
02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe
-
Size
6.2MB
-
MD5
0936dc7083dfbfcf09327552b1368b97
-
SHA1
577ab37884ffa38cbbec54c89afb24b010c9f4f2
-
SHA256
02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf
-
SHA512
955f550688ddcef0caa409850c3d0eb1dea555e1790f3e1bd20358c39b30a2705ca102495dda249f000b94a0dbff53228294951ddd1df473784336dcafb007f9
-
SSDEEP
98304:IHqPmH+R2r4fFtmocc/v21KsSXLzOh69CBkvZcUf1aphMoRdKuIXBbvCw:YqOeRrQlc/AV6uh69CBhQ1ghVRd8lC
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\Startup = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe" 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe -
Modifies registry class 25 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 4c00310000000000e558984a10204c6f63616c00380008000400efbee5587349e558984a2a000000050200000000020000000000000000000000000000004c006f00630061006c00000014000000 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4a0031000000000016591408102054656d700000360008000400efbee5587349165914082a00000006020000000002000000000000000000000000000000540065006d007000000014000000 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 7e0074001c00434653461600310000000000e5587349122041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f3c0008000400efbee5587349e55873492a000000f20100000000020000000000000000000000000000004100700070004400610074006100000042000000 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: 33 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: SeIncBasePriorityPrivilege 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: 33 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: SeIncBasePriorityPrivilege 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: 33 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: SeIncBasePriorityPrivilege 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: 33 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: SeIncBasePriorityPrivilege 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: 33 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: SeIncBasePriorityPrivilege 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: 33 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: SeIncBasePriorityPrivilege 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: 33 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: SeIncBasePriorityPrivilege 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: 33 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: SeIncBasePriorityPrivilege 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: 33 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: SeIncBasePriorityPrivilege 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: 33 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: SeIncBasePriorityPrivilege 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: 33 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: SeIncBasePriorityPrivilege 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: 33 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: SeIncBasePriorityPrivilege 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: 33 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: SeIncBasePriorityPrivilege 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: 33 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe Token: SeIncBasePriorityPrivilege 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe 2988 02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe"C:\Users\Admin\AppData\Local\Temp\02ec0e970f8b832a913f2fcbeb9053b5816cd978c600061d4344b035c05aa5cf.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD59eda6ac05d976773bec1a5ac2fc19c3b
SHA15885ea8e22e1d85b30e5e899c2f803c0212edccc
SHA25647cc32f966ed28e1bd719faa6ce6d2919c4d447ef784b866155796ebb410ae0a
SHA51221401d8c5336832d3603e596564065e20f178ec8cf5a983b232cdea97f1b5b55a6d3cfe141262e3680aa2caae8bcf9ec41d1db07e3d3edc243a7c308461975a9
-
Filesize
192KB
MD5df9ffe8b2b937c3316bbead7821bee5d
SHA14d6cb8554e3f9f243a775e9f9b5e107e31ebe571
SHA2564e760b339619cad772323203f2c9b4adc0c1e9b335f657afa0cb4087a036c42b
SHA5121e1cd1cbf337557333e341459f80a28cbd68e8452fca3ea844726afd19463404bb60760b1b1e8dfb881bfa8bfed6fdc77b1c31a55b8f9f63dfb9d7ad9de704fd
-
Filesize
132KB
MD53a9fff286cf967cfd251324c83bf4921
SHA1e0c90a51520ef36803469f3de79039db01cf49b9
SHA256bed9643898f91e7bcc4d551ceff435c02d71867cc5a950b0de53489e26cb2155
SHA512e772539f8f830d89797bd187dc07f1a66aea5aebcb7e8e2c569c8d53bcd19bb7deaf95c059c49c4d71dde8fdea07f0108e954b4cd966635881dc3e47bc62f4f0
-
Filesize
952KB
MD55168f1a61e75eef60cfd9b2356b2a033
SHA1ca83be6c65e002e5fdac81bc9021a3a2c88aa589
SHA2563d2d7161bda781e891c8b7609c4f3c28777b6440084be3b9dfab4b088cb496c9
SHA51247e50d390aebf028d8b9827aa078fd3cc34612190a46f8b6974b6d05cfa00fd6909c2f9fede6ef430552cb50e441d0970099d825df67ca9b462067839b00abea
-
Filesize
248KB
MD55379c9da4eecad6bd87e16fa9bf77793
SHA14952f040868210db520c15e2c948af48000da6b3
SHA256f0466700070303202910c7e7b740d3a96750b0fa8a5b5b035d789d2815d49029
SHA512a30f6a783377b932bd7c35194c883788ccde2f6040ae261d34aa22d93212a4f8184e9cf39208ddd52db23fb212a89757c1862df02bfc8ee90d61cca517485cde