Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-10-2024 11:09
Static task
static1
Behavioral task
behavioral1
Sample
4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe
Resource
win10v2004-20240802-en
General
-
Target
4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe
-
Size
212KB
-
MD5
47270a9d9119248e605c09b97f30814f
-
SHA1
141e0810297ed205ad354c172f5f49c9f426fc5c
-
SHA256
4bfcdab91905089e1f37d268519ce18bebd385c83ac10e0def8d4cf5bd47752d
-
SHA512
255397eac0e58a218cc862cd1a2e3fd00849eb39c4b4249718237ec95f9d1af239c0a28576eb380939459d87364c8f56a9cfe8aa9076f1ee4bc28b58e0821483
-
SSDEEP
3072:dEyEsrEpcMQhw/elabdxYBEsrE5cMQGxBcGy6v/yO9zEs11H:dJEVpcv/ab2EV5cvb8v/L9QC
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe -
Disables Task Manager via registry modification
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Angel2.exe 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Angel2.exe 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\gpmce = "\\Angel2.exe" 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\gpmce = "\\Angel2.exe" 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\search page = "www.booble.com" 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\start page = "www.gpmce.net" 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\DefaultIcon 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\DefaultIcon 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{645FF040-5081-1 = "%SystemRoot%\\Explorer.exe,0" 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1252 4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe"C:\Users\Admin\AppData\Local\Temp\4BFCDAB91905089E1F37D268519CE18BEBD385C83AC10E0DEF8D4CF5BD47752D.exe"1⤵
- Disables RegEdit via registry modification
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\S-1-5-21-3434294380-2554721341-1919518612-1000.exe
Filesize212KB
MD547270a9d9119248e605c09b97f30814f
SHA1141e0810297ed205ad354c172f5f49c9f426fc5c
SHA2564bfcdab91905089e1f37d268519ce18bebd385c83ac10e0def8d4cf5bd47752d
SHA512255397eac0e58a218cc862cd1a2e3fd00849eb39c4b4249718237ec95f9d1af239c0a28576eb380939459d87364c8f56a9cfe8aa9076f1ee4bc28b58e0821483