Analysis

  • max time kernel
    120s
  • max time network
    29s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 09:42

General

  • Target

    1758eaa9e34349f61a9f1176fb24dc9b59eccf98cf9899c45d572e6adb1b4069N.exe

  • Size

    416KB

  • MD5

    18f7318597e8a5587c34112044126280

  • SHA1

    c4850ea5517d2ac5fe62b5b4e2d62871e2e92c68

  • SHA256

    1758eaa9e34349f61a9f1176fb24dc9b59eccf98cf9899c45d572e6adb1b4069

  • SHA512

    cc7a4b7b96542332ce3769447afedb27e5e56d46eb812a743aa1b5c480c15c572320881c75882170693567f580b9700f7da272ecd21a02b2e986f8cf0624ee29

  • SSDEEP

    6144:vtq9OCvAI0Y/qMjUlofaeExV3a+e5qb8wAp5Ey+W0HXQGkJrx0Ph4orLCR5yMkIG:FivNiMDpExIpGrQnVxBoSh6DR0APt+Y

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Disables taskbar notifications via registry modification
  • Windows security modification 2 TTPs 8 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • System policy modification 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1758eaa9e34349f61a9f1176fb24dc9b59eccf98cf9899c45d572e6adb1b4069N.exe
    "C:\Users\Admin\AppData\Local\Temp\1758eaa9e34349f61a9f1176fb24dc9b59eccf98cf9899c45d572e6adb1b4069N.exe"
    1⤵
    • UAC bypass
    • Windows security bypass
    • Windows security modification
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • System policy modification
    PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\E1806D7E151F17890000E17F8C031C1C\E1806D7E151F17890000E17F8C031C1C.exe

    Filesize

    416KB

    MD5

    18f7318597e8a5587c34112044126280

    SHA1

    c4850ea5517d2ac5fe62b5b4e2d62871e2e92c68

    SHA256

    1758eaa9e34349f61a9f1176fb24dc9b59eccf98cf9899c45d572e6adb1b4069

    SHA512

    cc7a4b7b96542332ce3769447afedb27e5e56d46eb812a743aa1b5c480c15c572320881c75882170693567f580b9700f7da272ecd21a02b2e986f8cf0624ee29

  • memory/2236-7-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/2236-2-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/2236-5-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/2236-4-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/2236-3-0x0000000000401000-0x00000000004E5000-memory.dmp

    Filesize

    912KB

  • memory/2236-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2236-6-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/2236-8-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2236-9-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/2236-10-0x0000000000401000-0x00000000004E5000-memory.dmp

    Filesize

    912KB

  • memory/2236-12-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB

  • memory/2236-1-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/2236-23-0x0000000000400000-0x00000000004EE000-memory.dmp

    Filesize

    952KB