Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe
Resource
win10v2004-20240802-en
General
-
Target
13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe
-
Size
72KB
-
MD5
a3188aae76d8c959aa0cf338b7468300
-
SHA1
caa8ad9d7b988f86309b8a5ddfa68e8ad367fd53
-
SHA256
13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063
-
SHA512
b0b0739019ba5110db85b62fa4e9edc65bfbf36dff5269490c118599c360f2805ab70dad755c8c553daf38643f8d3ac41af3242062df12b6cd3c266612ed8b00
-
SSDEEP
768:s1ZSPvZYKHYZjXRIEeVFxhmmvdgZXjYt1NEDIefZsL:s7zKHCjBuV1mHJMt1y
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Executes dropped EXE 1 IoCs
pid Process 1620 Admin.exe -
Loads dropped DLL 2 IoCs
pid Process 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1620 Admin.exe 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 1620 Admin.exe 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 1620 Admin.exe 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 1620 Admin.exe 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 1620 Admin.exe 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 1620 Admin.exe 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 1620 Admin.exe 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 1620 Admin.exe 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 1620 Admin.exe 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 1620 Admin.exe 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 1620 Admin.exe 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 1620 Admin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1620 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 30 PID 1716 wrote to memory of 1620 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 30 PID 1716 wrote to memory of 1620 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 30 PID 1716 wrote to memory of 1620 1716 13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe"C:\Users\Admin\AppData\Local\Temp\13c887d96af718be5a9f60395694754823d291dc2e6c4fde3de34c4c987a7063N.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD537b2a36a5d646e5dd3c3316bf3490b3f
SHA19683e9a95aa698a757493cb4dd254f1a01b8793c
SHA256f34586a066d30543326a51257aa35616491760a5940ba342299bd3ffa7a68305
SHA512ce1cf7884c30b07d3b474a63b3ebaffe77e906b95b16a51d9b05d5846cc97de38b8657746d6639b7118964ff23b7b10ddf5a6baa96053695caa73fe380a0f8cd