Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 16:37
Static task
static1
Behavioral task
behavioral1
Sample
4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe
Resource
win10v2004-20241007-en
General
-
Target
4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe
-
Size
50KB
-
MD5
1937eafdcffc66a2d8ba15e08143ba80
-
SHA1
2260d6f806158993ba63fd0c27b3ca768f788c64
-
SHA256
4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704
-
SHA512
38f7bbe86dbc6258754068e425c127b516cbf0ca568274162645fbd7021091e0fad6e8c566996e8d0381afa96b0dc824779dc5eb69b96cd3f7f7c023d909a2ab
-
SSDEEP
1536:cFJ5U3TT5F9c+kZrWSIFsJAIFXacwjpPcJ3lu3kNS62kfFQy:65Yv5F6TZSy
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Executes dropped EXE 1 IoCs
pid Process 2792 Admin.exe -
Loads dropped DLL 2 IoCs
pid Process 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 2792 Admin.exe 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 2792 Admin.exe 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 2792 Admin.exe 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 2792 Admin.exe 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 2792 Admin.exe 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 2792 Admin.exe 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 2792 Admin.exe 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 2792 Admin.exe 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 2792 Admin.exe 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 2792 Admin.exe 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 2792 Admin.exe 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 2792 Admin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2792 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 31 PID 1668 wrote to memory of 2792 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 31 PID 1668 wrote to memory of 2792 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 31 PID 1668 wrote to memory of 2792 1668 4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe"C:\Users\Admin\AppData\Local\Temp\4f3a7172cec87f27a29a41568c02b0ce2cbb3f3c204960c406928dba9ddb5704N.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5eb7656b3d5f8d6c25e584a5ce4b0be9c
SHA1e1539a19e12b8a07d5184846f603f78e94ad93bf
SHA25603bedcc2205e9484b0d6f6f6902147b3cf1166f6347bd558cabb5237d70716f2
SHA51212f9d3e992611f071ac46d35e3f9c8c6af0a51e263ba349b44ba516f5a8ab1853cca6c9ce179969fa91c4271f472a7fd8751a134f2e54b1037a289167e39b8b5