Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12/06/2023, 19:48

General

  • Target

    7939d9228896b7830278c7f9a9fe0a6484d4cb39d18d3a927b4a8226025bf0fd.exe

  • Size

    4.9MB

  • MD5

    2b72c0118630bfcb00160f861b6d17d6

  • SHA1

    ba4cc3f8d87d534e3210acf28bdf80d35f95260a

  • SHA256

    7939d9228896b7830278c7f9a9fe0a6484d4cb39d18d3a927b4a8226025bf0fd

  • SHA512

    2c4df03bb3abc0205168ac540dcfa7b2d129e43b57bb7e0114f7e01bfe569494988d6b7086ae65db4776f6083c93ab06d56a8c1bd04a7a9b6613ed7a0e110836

  • SSDEEP

    98304:cihSU1i+k5ZL2FVw++gv6U8HoLAi7yBXhjZEJBAUZL/E:8oFe+Vv6U8HoE9BXlZEJVo

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7939d9228896b7830278c7f9a9fe0a6484d4cb39d18d3a927b4a8226025bf0fd.exe
    "C:\Users\Admin\AppData\Local\Temp\7939d9228896b7830278c7f9a9fe0a6484d4cb39d18d3a927b4a8226025bf0fd.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c echo y|cacls C:\Users\Admin\AppData\Local\Temp\element\userdata\server\serverlist.txt /t /p everyone:f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo y"
        3⤵
          PID:736
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Users\Admin\AppData\Local\Temp\element\userdata\server\serverlist.txt /t /p everyone:f
          3⤵
            PID:1584
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c echo y|cacls C:\Users\Admin\AppData\Local\Temp\element\userdata\server\serverlist.txt /t /p everyone:f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1632
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo y"
            3⤵
              PID:1476
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Users\Admin\AppData\Local\Temp\element\userdata\server\serverlist.txt /t /p everyone:f
              3⤵
                PID:1784

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\ClientConfig.ini

            Filesize

            602B

            MD5

            e6e389f48c0bc742e7feda71faf92689

            SHA1

            4f064abfdeb534e9b3f7780241368f3631aadd68

            SHA256

            fab0263de82c10ddbc502720d49f53f45a992d02f4832974923ea49dad53f294

            SHA512

            03fcd9106f7215c858852ccfc48e276797a37c540bde8e6d9f00916186aaf3ab61d5f8602ed432b85d27b7fea9b9dbd9d4202c8e4fc666f0a15b5b16a51743e2