Analysis

  • max time kernel
    149s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 04:34

General

  • Target

    e2ec535531bcc6a572195f75e2413745f1939b123c6d883bf3e25553eb5a69ed.exe

  • Size

    45KB

  • MD5

    130e2a8bec03a74bebee7d2b157347f0

  • SHA1

    672940bd811df503ab76b58b737c5f9e8409024c

  • SHA256

    e2ec535531bcc6a572195f75e2413745f1939b123c6d883bf3e25553eb5a69ed

  • SHA512

    e81cc76bdb6bd977818f2009cf9a9dde8df908679e20eb224bcab99332d84ebc205f77bbc2759a163ee60bdedb50fe5fadaf5db0b41ace7f20357d8fee6263c8

  • SSDEEP

    768:61gOAr1W1x1wouGz+zvY5OBU3KRcXANcIypfNxydwH/1H5:6661xqNk+zvY5FXANcIdq

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2ec535531bcc6a572195f75e2413745f1939b123c6d883bf3e25553eb5a69ed.exe
    "C:\Users\Admin\AppData\Local\Temp\e2ec535531bcc6a572195f75e2413745f1939b123c6d883bf3e25553eb5a69ed.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Windows\SysWOW64\Mcdjbf32.exe
      C:\Windows\system32\Mcdjbf32.exe
      2⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious behavior: GetForegroundWindowSpam
      PID:972

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Mcdjbf32.exe

          Filesize

          45KB

          MD5

          d83f923ac59269d6730f0a3d87472711

          SHA1

          8cb4582d7ba83426762b62c9b88d0fe523080956

          SHA256

          21b8b458dd45d07b2ce9ef3f11ebbbb3b6c679311b18def70f89fb9787352b1f

          SHA512

          6e958863574bcda13abd8be3edcfef52a0190fe625749ca4333db54d9310b488b05f48b1d1c748e4eefad338760a0e21d46984fcd517ff6522916b616693ec36

        • \Windows\SysWOW64\Mcdjbf32.exe

          Filesize

          45KB

          MD5

          d83f923ac59269d6730f0a3d87472711

          SHA1

          8cb4582d7ba83426762b62c9b88d0fe523080956

          SHA256

          21b8b458dd45d07b2ce9ef3f11ebbbb3b6c679311b18def70f89fb9787352b1f

          SHA512

          6e958863574bcda13abd8be3edcfef52a0190fe625749ca4333db54d9310b488b05f48b1d1c748e4eefad338760a0e21d46984fcd517ff6522916b616693ec36

        • \Windows\SysWOW64\Mcdjbf32.exe

          Filesize

          45KB

          MD5

          d83f923ac59269d6730f0a3d87472711

          SHA1

          8cb4582d7ba83426762b62c9b88d0fe523080956

          SHA256

          21b8b458dd45d07b2ce9ef3f11ebbbb3b6c679311b18def70f89fb9787352b1f

          SHA512

          6e958863574bcda13abd8be3edcfef52a0190fe625749ca4333db54d9310b488b05f48b1d1c748e4eefad338760a0e21d46984fcd517ff6522916b616693ec36

        • memory/900-55-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/900-56-0x0000000000220000-0x000000000024F000-memory.dmp

          Filesize

          188KB

        • memory/900-60-0x0000000000220000-0x000000000024F000-memory.dmp

          Filesize

          188KB

        • memory/972-61-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/972-62-0x0000000076071000-0x0000000076073000-memory.dmp

          Filesize

          8KB

        • memory/972-63-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB