Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2023, 21:01

General

  • Target

    1ff4a2f1296c1cd5d3cc50501533c9e5df0dba58f593bc5cb276bfcc68343708.exe

  • Size

    10.4MB

  • MD5

    e5ba319c7bfac28108656233ebc2ac12

  • SHA1

    3791b679c48d29a67748d55d7128eabc6b2c2270

  • SHA256

    1ff4a2f1296c1cd5d3cc50501533c9e5df0dba58f593bc5cb276bfcc68343708

  • SHA512

    cbbe1574907636066c03f2497a88470ddbc69adc0f8d42f5608b25e05e37cdef6e2fb52d3c10905c259d8c560796e7052512b88313ce39aeb5e4b0ca3fb1e244

  • SSDEEP

    196608:KUmN83YqsBmiFm4CTqfG+vTiwnDmNQkJM8uDIYnKODVJV:LmN83D4F3e+biSDcQwM8uDui

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ff4a2f1296c1cd5d3cc50501533c9e5df0dba58f593bc5cb276bfcc68343708.exe
    "C:\Users\Admin\AppData\Local\Temp\1ff4a2f1296c1cd5d3cc50501533c9e5df0dba58f593bc5cb276bfcc68343708.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\AppData\Roaming\datatemp\aria2c.exe
      "C:\Users\Admin\AppData\Roaming\datatemp\aria2c.exe" --conf-path=C:\Users\Admin\AppData\Roaming\datatemp\aria2.conf #--save-session=C:\Users\Admin\AppData\Roaming\datatemp\aria2.session --input-file=C:\Users\Admin\AppData\Roaming\datatemp\aria2.session --rpc-listen-port=7022 --listen-port=7055 --dht-listen-port=7033 --enable-rpc=true --rpc-allow-origin-all=true --disable-ipv6=false --rpc-secret=123 --enable-dht=true --enable-dht6=true --dht-file-path=C:/Users/Admin/AppData/Roaming/datatemp/dht.dat --dht-file-path6=C:/Users/Admin/AppData/Roaming/datatemp/dht6.dat --bt-external-ip=154.61.71.13 --stop-with-process=2172
      2⤵
      • Executes dropped EXE
      PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\datatemp\Bgm.mp3

    Filesize

    97KB

    MD5

    ef187b853b8b83d7581d8ae531bc7c3b

    SHA1

    8f8b42beb1fa6a02972e4b0f25968eb109a52b47

    SHA256

    0ab37333b45ebb9c97040477c37d21ff05a8b64a76cec42e4be29bbaf4625f70

    SHA512

    78494dacee9519576fc9c3ca0c2a14e984f4bfa6151848f414d00119083a4b6359fbf0350c702efe9b5444ed335bbdef201683fbc70218a481ffca9a82ca1028

  • C:\Users\Admin\AppData\Roaming\datatemp\aria2.conf

    Filesize

    55KB

    MD5

    4a1b71ede6ff12456038f6a26e356a42

    SHA1

    16af6552ebbeb0300d1451715add745e840ff993

    SHA256

    0ee9c9e686a595f86d25854bca6e92e8bfd51437a28306b4eaebf736156cc7ee

    SHA512

    bea15214c76083c86f4104e569bb93ba7000e4e555382b6cc97e0c9bdb6b4de72f50b8458d4c3420e073edefe4f40b7eea580000001d089fd5c78e303fbd8501

  • C:\Users\Admin\AppData\Roaming\datatemp\aria2c.exe

    Filesize

    4.8MB

    MD5

    a5c047f169471bd325552c255d6c04af

    SHA1

    e313cff2f3d668ec5d0e90920bd622b0f38aed9d

    SHA256

    cec8bb942475690363c1558fdf55e3cf59f29607967a822a626d4976a348334a

    SHA512

    6cf929d36ea0c95815d3218a3b11f0c8f539a6113c368642a70d41379145ba7ace9aed1e5b78836a4cd2ca861d9bcd10fea3e7fc126adb85822ed4cf4f762f0d

  • \Users\Admin\AppData\Roaming\datatemp\aria2c.exe

    Filesize

    4.8MB

    MD5

    a5c047f169471bd325552c255d6c04af

    SHA1

    e313cff2f3d668ec5d0e90920bd622b0f38aed9d

    SHA256

    cec8bb942475690363c1558fdf55e3cf59f29607967a822a626d4976a348334a

    SHA512

    6cf929d36ea0c95815d3218a3b11f0c8f539a6113c368642a70d41379145ba7ace9aed1e5b78836a4cd2ca861d9bcd10fea3e7fc126adb85822ed4cf4f762f0d

  • \Users\Admin\AppData\Roaming\datatemp\libcurl.dll

    Filesize

    2.5MB

    MD5

    298f5812023bab65ee23d13ee9489a6e

    SHA1

    71e9d7f205e5e7af6907c539c77a3aeea971692f

    SHA256

    fe100d35b034c15ae3b74379f4eedd321c8e4b84fe666b54ee924ca2a8bdca6e

    SHA512

    217258fb7728f61199f913fb98c894077c12a124e1596d1c6c7cfc065d4d2a6e1e03ad950c3321e2a8dcd997fb5c9524f98530db4bcb39f9914ecb5ff0e22dbd

  • memory/2172-0-0x0000000000400000-0x0000000000EA4000-memory.dmp

    Filesize

    10.6MB

  • memory/2172-25-0x0000000000400000-0x0000000000EA4000-memory.dmp

    Filesize

    10.6MB

  • memory/2704-95-0x0000000000400000-0x00000000008CE000-memory.dmp

    Filesize

    4.8MB