Analysis

  • max time kernel
    135s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/12/2022, 03:00

General

  • Target

    f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894.exe

  • Size

    285KB

  • MD5

    cbc709be817d9d090ca2490aad1f5e22

  • SHA1

    e375484efb972dd801dbf48e82f49ea0deafea8d

  • SHA256

    f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894

  • SHA512

    0ad197b61eba3c49c0f3efbb04bbf0a8f2cb2080f5ec14477f12f5e1ef1dd7a3d27ce655f49ed5daa793879835a08834d1a6111e2e4f9b4aabc769677d860af4

  • SSDEEP

    6144:K1tC/lxQEMOG/OIgcwKQgno63E2fMXh9x0C8jpUGKq:K6xwOGdwKJoOIhr89UGKq

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894.exe
    "C:\Users\Admin\AppData\Local\Temp\f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894.exe"
    1⤵
    • Adds Run key to start application
    PID:1348
  • C:\Users\Admin\AppData\Local\Temp\olkn.exe
    C:\Users\Admin\AppData\Local\Temp\olkn.exe -svc
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    • Modifies Internet Explorer settings
    PID:728

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\olkn.exe

          Filesize

          285KB

          MD5

          cbc709be817d9d090ca2490aad1f5e22

          SHA1

          e375484efb972dd801dbf48e82f49ea0deafea8d

          SHA256

          f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894

          SHA512

          0ad197b61eba3c49c0f3efbb04bbf0a8f2cb2080f5ec14477f12f5e1ef1dd7a3d27ce655f49ed5daa793879835a08834d1a6111e2e4f9b4aabc769677d860af4

        • \??\c:\users\admin\appdata\local\temp\olkn.exe

          Filesize

          285KB

          MD5

          cbc709be817d9d090ca2490aad1f5e22

          SHA1

          e375484efb972dd801dbf48e82f49ea0deafea8d

          SHA256

          f01c40059ca6f555a22b105a881797b9dad1c8b748721b231e0354e7a4940894

          SHA512

          0ad197b61eba3c49c0f3efbb04bbf0a8f2cb2080f5ec14477f12f5e1ef1dd7a3d27ce655f49ed5daa793879835a08834d1a6111e2e4f9b4aabc769677d860af4

        • memory/728-69-0x0000000000400000-0x0000000000458200-memory.dmp

          Filesize

          352KB

        • memory/728-81-0x0000000000240000-0x000000000025A000-memory.dmp

          Filesize

          104KB

        • memory/728-84-0x0000000000240000-0x000000000025A000-memory.dmp

          Filesize

          104KB

        • memory/1348-54-0x0000000000400000-0x0000000000458200-memory.dmp

          Filesize

          352KB

        • memory/1348-55-0x0000000000220000-0x0000000000232000-memory.dmp

          Filesize

          72KB

        • memory/1348-56-0x0000000000240000-0x000000000025A000-memory.dmp

          Filesize

          104KB

        • memory/1348-57-0x0000000074F41000-0x0000000074F43000-memory.dmp

          Filesize

          8KB

        • memory/1348-58-0x0000000000240000-0x000000000025A000-memory.dmp

          Filesize

          104KB

        • memory/1348-67-0x0000000000240000-0x000000000025A000-memory.dmp

          Filesize

          104KB

        • memory/1348-83-0x0000000000240000-0x000000000025A000-memory.dmp

          Filesize

          104KB