Analysis

  • max time kernel
    44s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    30/10/2022, 20:30

General

  • Target

    d6754ea74af215d576fd4029b79b6f954d476538d41a198383e1c41f134819c5.exe

  • Size

    230KB

  • MD5

    a19cf66755d7c154cb1f8d4e482d8be0

  • SHA1

    bef72de90db2d9bff94aa210e368a1771b6b4059

  • SHA256

    d6754ea74af215d576fd4029b79b6f954d476538d41a198383e1c41f134819c5

  • SHA512

    5df9b224c170a93ddcb05400c95a428e303446acb5493d893870a36f39b9c4a5e810d23a7a9450ebad3a65ae5ce98cdd866b967ce67ef7284a130935f32adb8f

  • SSDEEP

    6144:JQwHORhTEvZZ5/ubGt46hFLohLdeE2ZPsMGn3J1J0k:4T0ZSbqkIZP+jJ0k

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Windows directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6754ea74af215d576fd4029b79b6f954d476538d41a198383e1c41f134819c5.exe
    "C:\Users\Admin\AppData\Local\Temp\d6754ea74af215d576fd4029b79b6f954d476538d41a198383e1c41f134819c5.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Documents and Settings\tazebama.dl_
      "C:\Documents and Settings\tazebama.dl_"
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops autorun.inf file
      • Suspicious behavior: EnumeratesProcesses
      PID:1068

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings\tazebama.dl_

    Filesize

    157KB

    MD5

    696a3784eaa9a83d02606a12106cf601

    SHA1

    453f4b702c1b1c74c1b53357be8b2509916326e9

    SHA256

    9933646be20044df33fe9457bc03a3e9c50130183ab5eeeae8a7149b5683b533

    SHA512

    b8420cf16008d1cbfd989b8974d620ca4dfd957a48409c42128b47b92a595135add8aa12ee04503c686e3d9393ff3af2ff416cf01d57b35365e5f7833b0d8bc5

  • C:\Users\tazebama.dl_

    Filesize

    157KB

    MD5

    696a3784eaa9a83d02606a12106cf601

    SHA1

    453f4b702c1b1c74c1b53357be8b2509916326e9

    SHA256

    9933646be20044df33fe9457bc03a3e9c50130183ab5eeeae8a7149b5683b533

    SHA512

    b8420cf16008d1cbfd989b8974d620ca4dfd957a48409c42128b47b92a595135add8aa12ee04503c686e3d9393ff3af2ff416cf01d57b35365e5f7833b0d8bc5

  • \Users\tazebama.dl_

    Filesize

    157KB

    MD5

    696a3784eaa9a83d02606a12106cf601

    SHA1

    453f4b702c1b1c74c1b53357be8b2509916326e9

    SHA256

    9933646be20044df33fe9457bc03a3e9c50130183ab5eeeae8a7149b5683b533

    SHA512

    b8420cf16008d1cbfd989b8974d620ca4dfd957a48409c42128b47b92a595135add8aa12ee04503c686e3d9393ff3af2ff416cf01d57b35365e5f7833b0d8bc5

  • \Users\tazebama.dl_

    Filesize

    157KB

    MD5

    696a3784eaa9a83d02606a12106cf601

    SHA1

    453f4b702c1b1c74c1b53357be8b2509916326e9

    SHA256

    9933646be20044df33fe9457bc03a3e9c50130183ab5eeeae8a7149b5683b533

    SHA512

    b8420cf16008d1cbfd989b8974d620ca4dfd957a48409c42128b47b92a595135add8aa12ee04503c686e3d9393ff3af2ff416cf01d57b35365e5f7833b0d8bc5

  • \Users\tazebama.dll

    Filesize

    32KB

    MD5

    b6a03576e595afacb37ada2f1d5a0529

    SHA1

    d598d4d0e70dec2ffa2849edaeb4db94fedcc0b8

    SHA256

    1707eaf60aa91f3791aa5643bfa038e9d8141878d61f5d701ebac51f4ae7aaad

    SHA512

    181b7cc6479352fe2c53c3630d45a839cdeb74708be6709c2a75847a54de3ffc1fdac8450270dde7174ecb23e5cb002f8ce39032429a3112b1202f3381b8918c

  • memory/1068-63-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/2012-54-0x0000000074B51000-0x0000000074B53000-memory.dmp

    Filesize

    8KB

  • memory/2012-60-0x0000000001000000-0x000000000101A000-memory.dmp

    Filesize

    104KB