Resubmissions

23-04-2023 17:07

230423-vm2waagc9v 7

23-04-2023 17:03

230423-vkr83aeg34 7

23-04-2023 16:56

230423-vf3h8sef88 7

Analysis

  • max time kernel
    151s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    23-04-2023 17:07

General

  • Target

    Hexa v1.5/Hexa/HexaUI.config

  • Size

    438B

  • MD5

    909df77c711b4133a8f8560483ec2bb3

  • SHA1

    8df8505ec0a0dd670b4044c641e772f6ded485a1

  • SHA256

    c49ed8da5765f33cc854cf13ee0c33ed65d4eba6843c24d05e321e3b40f4a68c

  • SHA512

    0547bae72cd75ad753ddd95c12b7a42b8b3285a3384925cf738c4cc6835c6dd21d16a6206662c4a723fcf348da7e62db3585564782c7daad49b765b43accb28d

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Hexa v1.5\Hexa\HexaUI.config"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Hexa v1.5\Hexa\HexaUI.config"
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of SetWindowsHookEx
      PID:556

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads