Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe
Resource
win10v2004-20240802-en
General
-
Target
fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe
-
Size
4.7MB
-
MD5
3be4e1013e2499dd81c85fc95dfdd1a9
-
SHA1
e2c9f420fc388ad164f8ce7095dadfeff1598f57
-
SHA256
fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e
-
SHA512
f31c5e814e0e30147ddaf10f5ef3e9b22c0574e9d1cc83e9840ef8d9e4539e21fcf5b9e608f30a693832af476c77c1ea2883b87d7e42a7e6416985415cd90225
-
SSDEEP
98304:aR3Qw1y8tYfW5nySnFrGs7kIzfy2WQpf4gtWy:2N1y8tp5n5FrG4jzHW3gH
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe = "11000" fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2308 fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe 2308 fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2308 fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe 2308 fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe 2308 fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe 2308 fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe 2308 fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe"C:\Users\Admin\AppData\Local\Temp\fee693efbf27669c8107b25e0596559aeb1b575b5d92b3dbf2642a260aff239e.exe"1⤵
- Drops desktop.ini file(s)
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282B
MD59e36cc3537ee9ee1e3b10fa4e761045b
SHA17726f55012e1e26cc762c9982e7c6c54ca7bb303
SHA2564b9d687ac625690fd026ed4b236dad1cac90ef69e7ad256cc42766a065b50026
SHA5125f92493c533d3add10b4ce2a364624817ebd10e32daa45ee16593e913073602db5e339430a3f7d2c44abf250e96ca4e679f1f09f8ca807d58a47cf3d5c9c3790