Resubmissions

19-09-2024 21:39

240919-1hv5tssapf 5

19-09-2024 21:25

240919-z9xx3a1flc 5

Analysis

  • max time kernel
    146s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-09-2024 21:39

General

  • Target

    a3a5e7011335a2284e2d4f73fd464ff129f0c9276878a054c1932bc50608584b.exe

  • Size

    2.7MB

  • MD5

    8b1ab40c7362b992e571d6980f585ef0

  • SHA1

    df8833bb710ead484f4faa63f95cafa7ffb08c54

  • SHA256

    a3a5e7011335a2284e2d4f73fd464ff129f0c9276878a054c1932bc50608584b

  • SHA512

    87a6553c9e57db4536b7c0312b1cf24071492f2c77f30d82bba34d50419819480c673d1886a9d9120ad2fba38887cd57225b23eab9e206373f23793b25c49353

  • SSDEEP

    49152:e2rYDqbnu61UQxMfxVGOwMApIvhsD/eiUsQHGZXqKPRD:Pvnu6OHPwZNXqKPZ

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3a5e7011335a2284e2d4f73fd464ff129f0c9276878a054c1932bc50608584b.exe
    "C:\Users\Admin\AppData\Local\Temp\a3a5e7011335a2284e2d4f73fd464ff129f0c9276878a054c1932bc50608584b.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2404
  • C:\Windows\system32\SearchIndexer.exe
    C:\Windows\system32\SearchIndexer.exe /Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1896
    • C:\Windows\system32\SearchProtocolHost.exe
      "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
      2⤵
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      PID:3704
    • C:\Windows\system32\SearchFilterHost.exe
      "C:\Windows\system32\SearchFilterHost.exe" 0 684 688 696 8192 692
      2⤵
      • Modifies data under HKEY_USERS
      PID:1144
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2396
    • C:\Users\Admin\AppData\Local\Temp\a3a5e7011335a2284e2d4f73fd464ff129f0c9276878a054c1932bc50608584b.exe
      "C:\Users\Admin\AppData\Local\Temp\a3a5e7011335a2284e2d4f73fd464ff129f0c9276878a054c1932bc50608584b.exe"
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\L5P12AEX\killer-404-page-coschedule-5f3d58c828b04[1].png

      Filesize

      47KB

      MD5

      5fd371a758439125f49fb93a4ed68a87

      SHA1

      9cedae0d41f089791d89210f0305296fe24b6a51

      SHA256

      4b2ed5dab4a629d143494a3a5141cf1fb2f23d5868f762b54d141c857c03c5f7

      SHA512

      dc1687005ca0e18e5294266fb120a9c13173a3cf05b8c098f8ad435e4de4790cfba1be5e3156b7820b0d9799aa013632f86764f0ee652934b1dd614d71f24e1d

    • memory/1144-72-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-59-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-49-0x00000292AC6A0000-0x00000292AC6B0000-memory.dmp

      Filesize

      64KB

    • memory/1144-51-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-70-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-56-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-58-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-67-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-57-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-65-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-66-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-69-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-68-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-71-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-73-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-93-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-54-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-90-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-62-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-74-0x00000292AC6A0000-0x00000292AC6B0000-memory.dmp

      Filesize

      64KB

    • memory/1144-75-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-76-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-77-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-80-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-79-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-78-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-83-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-86-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-88-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-87-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1144-89-0x00000292AC6D0000-0x00000292AC6E0000-memory.dmp

      Filesize

      64KB

    • memory/1896-43-0x000001B9239B0000-0x000001B9239B8000-memory.dmp

      Filesize

      32KB

    • memory/1896-11-0x000001B91F350000-0x000001B91F360000-memory.dmp

      Filesize

      64KB

    • memory/1896-27-0x000001B91F5E0000-0x000001B91F5F0000-memory.dmp

      Filesize

      64KB