Analysis

  • max time kernel
    138s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    10/06/2023, 17:32

General

  • Target

    v71installer/MH71 Installer.exe

  • Size

    439KB

  • MD5

    094aa0eb3db132348242687fbaab8ee3

  • SHA1

    d3338ce29aa68747b10ddc71d1c3ac0ea29c57c4

  • SHA256

    5e57fdc84d36af1d3b787eded2533985dc19f63d3ede1e71950b1235886f8332

  • SHA512

    c72a7555cc76603a5a8b7f103926cdd58ea0591fad0425732641a647706034b370b71f779aadedd4522f4f1657d4392b6cad966a7ebc9d7f7c8b76dda8c7bf6f

  • SSDEEP

    6144:q/lnYIy+wqgrj8vJyGjgzhHov+6UNlcL30Nxb48LAOvxuVTSLlirYtr+9mHOaPPF:q/uIypPARyGjgzhH3xbbJ1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\v71installer\MH71 Installer.exe
    "C:\Users\Admin\AppData\Local\Temp\v71installer\MH71 Installer.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1380-54-0x0000000000200000-0x0000000000210000-memory.dmp

    Filesize

    64KB

  • memory/1380-55-0x0000000000230000-0x000000000023A000-memory.dmp

    Filesize

    40KB

  • memory/1380-56-0x0000000000230000-0x000000000023A000-memory.dmp

    Filesize

    40KB

  • memory/1380-57-0x0000000000200000-0x0000000000210000-memory.dmp

    Filesize

    64KB

  • memory/1380-58-0x0000000000230000-0x000000000023A000-memory.dmp

    Filesize

    40KB

  • memory/1380-59-0x0000000000230000-0x000000000023A000-memory.dmp

    Filesize

    40KB

  • memory/1380-60-0x0000000003C60000-0x0000000003C62000-memory.dmp

    Filesize

    8KB

  • memory/1380-62-0x0000000003C50000-0x0000000003C51000-memory.dmp

    Filesize

    4KB

  • memory/1380-64-0x0000000003C50000-0x0000000003C51000-memory.dmp

    Filesize

    4KB