Resubmissions

26/04/2023, 05:46

230426-ggqn6shc7w 7

26/04/2023, 05:36

230426-gak54shc4x 7

Analysis

  • max time kernel
    39s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    26/04/2023, 05:36

General

  • Target

    1.exe

  • Size

    472KB

  • MD5

    7d279adf529721141bbb6768ed039ac5

  • SHA1

    498ec140dc0f1763bbb37d5b9194fc1448e4596b

  • SHA256

    0b3e1559b5ecac6846f44a8d6c2abc0d58816499e148500532b3c66e426ef23c

  • SHA512

    2fd563f58014f9df9c98496252047b1f2c5f8288065656e705d4e97aec3b3cabf7c22e070cfbc6f4d0b9c26adbeda4e8a0606010c2ffa0e93816f3ba852ebbf3

  • SSDEEP

    12288:bLHzRv6FusqtneXYPWv6oSm93yOz93yO:bDzRv6FutnPsN3R3

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.exe
    "C:\Users\Admin\AppData\Local\Temp\1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Public\Videos\MNvEbYkS.exe
      "C:\Users\Public\Videos\MNvEbYkS.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Suspicious use of SetWindowsHookEx
      PID:1228

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Videos\MNvEbYkS.exe

    Filesize

    905KB

    MD5

    790c885de6cd9b130bbfb8332652b0fc

    SHA1

    5c9d3aaa43c7982e98d33c7d5c50e42fd84493df

    SHA256

    c39d7f48548c8ee0b8dc36f4d4a452658fa5f3308bcb2c7bf181dc4e09191e8b

    SHA512

    7cf09b39a2f9f07d3259d6f01f793bf89ec19c46aad0f8feb9541ddef21e1b4459b8a3042aa8aa1bf2fc31f00e64cd40485e5cb5e3474757bcded1a55e4b7304

  • C:\Users\Public\Videos\MNvEbYkS.exe

    Filesize

    905KB

    MD5

    790c885de6cd9b130bbfb8332652b0fc

    SHA1

    5c9d3aaa43c7982e98d33c7d5c50e42fd84493df

    SHA256

    c39d7f48548c8ee0b8dc36f4d4a452658fa5f3308bcb2c7bf181dc4e09191e8b

    SHA512

    7cf09b39a2f9f07d3259d6f01f793bf89ec19c46aad0f8feb9541ddef21e1b4459b8a3042aa8aa1bf2fc31f00e64cd40485e5cb5e3474757bcded1a55e4b7304

  • C:\Users\Public\Videos\MNvEbYkS.exe

    Filesize

    905KB

    MD5

    790c885de6cd9b130bbfb8332652b0fc

    SHA1

    5c9d3aaa43c7982e98d33c7d5c50e42fd84493df

    SHA256

    c39d7f48548c8ee0b8dc36f4d4a452658fa5f3308bcb2c7bf181dc4e09191e8b

    SHA512

    7cf09b39a2f9f07d3259d6f01f793bf89ec19c46aad0f8feb9541ddef21e1b4459b8a3042aa8aa1bf2fc31f00e64cd40485e5cb5e3474757bcded1a55e4b7304

  • C:\Users\Public\Videos\StarBurn.dll

    Filesize

    99KB

    MD5

    ea4aac0fe87c49a53c0af366fae61fed

    SHA1

    48a6154b37cf84e61284ac04c677afce554e6677

    SHA256

    cbccaabe5611e406c041c24e22b90bba6a64eda5113a0faebc7ef3960b04452b

    SHA512

    303ed937f931ae3289f228b3ae4d48cd4bd9f19ea54221589b6cfd2cb95b37a0b4d8e2a44e6daae07d46855ccd63ee671147771081f426349cbc441b9016721f

  • \Users\Public\Videos\MNvEbYkS.exe

    Filesize

    905KB

    MD5

    790c885de6cd9b130bbfb8332652b0fc

    SHA1

    5c9d3aaa43c7982e98d33c7d5c50e42fd84493df

    SHA256

    c39d7f48548c8ee0b8dc36f4d4a452658fa5f3308bcb2c7bf181dc4e09191e8b

    SHA512

    7cf09b39a2f9f07d3259d6f01f793bf89ec19c46aad0f8feb9541ddef21e1b4459b8a3042aa8aa1bf2fc31f00e64cd40485e5cb5e3474757bcded1a55e4b7304

  • \Users\Public\Videos\StarBurn.dll

    Filesize

    99KB

    MD5

    ea4aac0fe87c49a53c0af366fae61fed

    SHA1

    48a6154b37cf84e61284ac04c677afce554e6677

    SHA256

    cbccaabe5611e406c041c24e22b90bba6a64eda5113a0faebc7ef3960b04452b

    SHA512

    303ed937f931ae3289f228b3ae4d48cd4bd9f19ea54221589b6cfd2cb95b37a0b4d8e2a44e6daae07d46855ccd63ee671147771081f426349cbc441b9016721f

  • memory/1716-54-0x0000000000400000-0x000000000051C000-memory.dmp

    Filesize

    1.1MB

  • memory/1716-60-0x0000000000400000-0x000000000051C000-memory.dmp

    Filesize

    1.1MB

  • memory/1716-72-0x0000000000400000-0x000000000051C000-memory.dmp

    Filesize

    1.1MB