Resubmissions

21/09/2024, 01:26

240921-btxelayfjj 7

20/09/2024, 22:44

240920-2pam5ssflq 3

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 01:26

General

  • Target

    The Injector lol made with c# ReIn2ct1.zip

  • Size

    14.1MB

  • MD5

    d0785a1784a9904f6a716618f4e8f878

  • SHA1

    df211857a3a310d1762b27b36c78af905636f2a5

  • SHA256

    213720c1d351d7ba4796a645e08b086fa309423e519d57dd15ad570f3301661a

  • SHA512

    2a50dc542ec9f8bc7006cec3072aa71d643e95afd8eb9b74bb3906571b4d32030d42530ccab17f47c4d115bce78948168f63fb54e2996ecb6b3ae13e29cc3143

  • SSDEEP

    393216:6rj5GryEtqLlVh4Jl8G/10GDO40KVQlifi9AfU/jp8bGhsvQJ:6rnVai8Gw6Kfgj8ssvQJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1.zip"
    1⤵
      PID:2520
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1900
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\The Injector lol made with c# ReIn2ct1.zip"
      1⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2724
      • C:\Users\Admin\AppData\Local\Temp\7zO4AAD55D7\ReIn2ct.exe
        "C:\Users\Admin\AppData\Local\Temp\7zO4AAD55D7\ReIn2ct.exe"
        2⤵
        • Executes dropped EXE
        PID:2692

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\7zO4AAD55D7\ReIn2ct.exe

            Filesize

            129KB

            MD5

            d84aaca1a705738bb6793fadf35487f5

            SHA1

            2fec4ba481036efbbdf5eeaeab27eeef689e795f

            SHA256

            5264694a8c8dc7f2366f89c8b29fd7bd876fb7761dd81dffb8d640ec1fed599f

            SHA512

            599c3bb7a635814b8cb2647360abe942cbf83e25a25c129c229ac836481eb49ba1185fbe3e0ae3f1282e97ccc593aa79a93c08e299c189d9062594b7c3c757ff

          • memory/1900-0-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/1900-1-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/1900-2-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB