Analysis
-
max time kernel
149s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe
Resource
win10v2004-20241007-en
General
-
Target
36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe
-
Size
40KB
-
MD5
39c32541690fb3ccdb46428f24046bba
-
SHA1
7925a5063fc59165ed9c8ff8bd3d5147aa0fce84
-
SHA256
36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0
-
SHA512
f7b241acab89edf61b714b20cc8548987bc0c28ecf7f26392a2fbb6f379ec22b000adfd2b6f89fb0cb8c8d23f0f18c26ffd92ecf0b76ba1cae46db85e2b6b61e
-
SSDEEP
768:Yrfko/X6mjiTSxWTpp8F9bdHXtHs7CQpcdHoCCvc:Y48jiO4j8F95NWee1vc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Executes dropped EXE 1 IoCs
pid Process 776 Admin.exe -
Loads dropped DLL 2 IoCs
pid Process 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Admin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 776 Admin.exe 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 776 Admin.exe 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 776 Admin.exe 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 776 Admin.exe 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 776 Admin.exe 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 776 Admin.exe 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 776 Admin.exe 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 776 Admin.exe 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 776 Admin.exe 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 776 Admin.exe 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 776 Admin.exe 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 776 Admin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1960 wrote to memory of 776 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 30 PID 1960 wrote to memory of 776 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 30 PID 1960 wrote to memory of 776 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 30 PID 1960 wrote to memory of 776 1960 36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe"C:\Users\Admin\AppData\Local\Temp\36b4d731a321219f5fdbaf50a33c3828e57752f90150879a08f68da7b6f815e0.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:776
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5b77b10cd026e2cdf645f8a1dd22367f3
SHA1f18a15b33f86f38fc529e01d55699fe94f78cec2
SHA256e8b6b0eaf4febaab56ec6cee206ef0c352d8cc42ba0477a2e1885b1e12851023
SHA512bb5ab4f83e2a0e8e33b5d8b38f3aa44dfc3427a09985cb28f1232faad58f8e49a6df649bb924b3342efdeb22595b80705cf4debb0fd7ca88f2b442cd655e359c