Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 15:52
Behavioral task
behavioral1
Sample
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe
Resource
win10v2004-20241007-en
General
-
Target
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe
-
Size
9.8MB
-
MD5
713998985d9253877d350df15b73960e
-
SHA1
25084c650226fea6723520dfcddd7aeae3cfafeb
-
SHA256
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9
-
SHA512
c3f8d6fb21b8aa9a50262c34536b3677423e19288599276068709526aa8410fe90ec748563c9f488613a4bb7bbcdfdc65cae1388f1c48c43fcb62e73bfddd3be
-
SSDEEP
196608:Hyu91Hc3U2aFFSmAxz0J3I4Oo19wOZn3rUnLw8J51SHDi0:Suv/dAxo3fdZnALw8vkDl
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/272-41-0x0000000000800000-0x0000000001CA1000-memory.dmp vmprotect behavioral1/memory/272-40-0x0000000000800000-0x0000000001CA1000-memory.dmp vmprotect behavioral1/memory/272-35-0x0000000000800000-0x0000000001CA1000-memory.dmp vmprotect behavioral1/memory/272-42-0x0000000000800000-0x0000000001CA1000-memory.dmp vmprotect behavioral1/memory/272-65-0x0000000000800000-0x0000000001CA1000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\CareUEyes = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe /tray" a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe -
Modifies registry class 4 IoCs
Processes:
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Wow6432Node\CLSID\{FC36FD6A-7586-4ad1-8CBF-EB8AB7A51533} a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Wow6432Node a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Wow6432Node\CLSID a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\Wow6432Node\CLSID\{FC36FD6A-7586-4ad1-8CBF-EB8AB7A51533}\uuid = "N2JkNTE4MzZiYzY1ZWQ1MzUxYjgwNTBmYTA1ODM3NmM=" a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exepid process 272 a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe 272 a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exepid process 272 a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exepid process 272 a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe"C:\Users\Admin\AppData\Local\Temp\a2acb0ede26eb7fe02bd0530194fb02b2c55e520a93197733c51427c29dd19e9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD516018d86bfdbfd050a56ba88f6e3af40
SHA18278bb3ff93b5b60d503142cad8cb1006a900925
SHA256599af91dc05907205f337530b57cf5676c790a3e71e7846e6c1f667730bfca8f
SHA512e43a69af808f1d91d9b2836860d10b55ff4566942a3b404c56a529b6b138e12e80870c716bf713484158e1832f4bf889618ce7cfbd9251d3062abffa3054503b