Analysis

  • max time kernel
    161s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 09:45

General

  • Target

    37901b74631e5b916af4887086c325b4b4336953b7e1e97f06ff40f9c0536655.exe

  • Size

    3.1MB

  • MD5

    c54f19fb00161407bffe72400cb5eb6f

  • SHA1

    15e6b9e9ba568edd110d5c7b3137114099c3b963

  • SHA256

    37901b74631e5b916af4887086c325b4b4336953b7e1e97f06ff40f9c0536655

  • SHA512

    ca3ff2ea4cc304ac2cad38e7696848e0c64f49e1d57a25332a50780aca560befb23ea9b8161d7691eca8c11aab5e8fbe3f689172471bd550b9cfc22b31f65384

  • SSDEEP

    98304:tswHf0ZCb1htoGBAMzBjBTDy9MTFE8as+u:tJcM+u

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 62 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37901b74631e5b916af4887086c325b4b4336953b7e1e97f06ff40f9c0536655.exe
    "C:\Users\Admin\AppData\Local\Temp\37901b74631e5b916af4887086c325b4b4336953b7e1e97f06ff40f9c0536655.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZFOAR009\ad-mymacro[1].xml

    Filesize

    1KB

    MD5

    b4494a1e6f7528baca56904d6944c36c

    SHA1

    18f7ef9460a437a81a7cab4056573d897faab4b9

    SHA256

    ec36e69c20842ddcc31eb91b44c084c606b4bba604f5a4d1a43997586b89cd63

    SHA512

    cd4545def03d504251b963d3ddb66e427d6a74691767c2264baadc241a39940dd548499bbc04623700201c9f2809a8c31441a8ece89c5235d53aa877cf177fbb

  • C:\Users\Admin\AppData\Local\Temp\1218background.bmp

    Filesize

    822KB

    MD5

    f7a00940775d148e019c1be2986b9aee

    SHA1

    4f9f7db1a4b295a778f172abb030570263c7535f

    SHA256

    26aa5181488cae4f2653e404389a17cc91e070bcd4e46b861ad050451c6c2c7c

    SHA512

    03eb23d71332ca372e1cd5c1e9f872cb656cd3f719a0770fd3b892c64f9fe708c1ca01bfdccf33e66b67ebe09ed341008ab5a296d89b54c744f57cc73aee4032

  • C:\Users\Admin\AppData\Local\Temp\37901b74631e5b916af4887086c325b4b4336953b7e1e97f06ff40f9c0536655.ini

    Filesize

    50B

    MD5

    52f125f8639e4bf2d46825376bd70a5d

    SHA1

    8cf26ac080b698b11926c707ed44f03bedb9ecc9

    SHA256

    fa918a5a58be6eceb0763003444bda2a824f7ce6a13934a2cd6e08458493bac0

    SHA512

    43897ed016cc5972c36a0addb14a29c1b0175fea79b76683586f3c3f547636b577a88262641c6bc24917d15cd98e6e9aab868e6e1b7ec25107cb6aea8980b6fa

  • C:\Users\Admin\AppData\Local\Temp\9BC3.tmp

    Filesize

    517B

    MD5

    b88db7ec3be359c3f7962539ad0c4756

    SHA1

    917c22eba2bfb8b9d634ac5b7a22e295062b2db8

    SHA256

    ea7edfbcc203d72def95e3d54bea93e81c75391e611a93a409fd75c768c73be5

    SHA512

    58f1413b95a6a0967b22fa3e329982a269e4abdd6c72c987ac78ad6fc711252466544983141ce974b60fd979f06ed5a6f3a91a903f22710e291310d1a7cba1f5

  • C:\Users\Admin\AppData\Local\Temp\cfgdll.dll

    Filesize

    45KB

    MD5

    1479c26076bb69ef920b567bbe166fb5

    SHA1

    725b96c0aa4d3ed117ab4f9ddedc5243b1b5b489

    SHA256

    ec4f7a4bce0407f7d04492e036b149b5db0224231b8ecbb77eb88cf94507be3a

    SHA512

    afad589f9c512ba40149a25055ec9beba761933a64aed3b10aa4263150adcfad7b0c93e94c173a97e446117f2b4006861914944856be1bf227b04ce6704068b3

  • C:\Users\Admin\AppData\Local\Temp\cfgdll.dll

    Filesize

    45KB

    MD5

    1479c26076bb69ef920b567bbe166fb5

    SHA1

    725b96c0aa4d3ed117ab4f9ddedc5243b1b5b489

    SHA256

    ec4f7a4bce0407f7d04492e036b149b5db0224231b8ecbb77eb88cf94507be3a

    SHA512

    afad589f9c512ba40149a25055ec9beba761933a64aed3b10aa4263150adcfad7b0c93e94c173a97e446117f2b4006861914944856be1bf227b04ce6704068b3

  • C:\Users\Admin\AppData\Roaming\qmacro\qdisp.dll

    Filesize

    41KB

    MD5

    55672394cb568d39230a19ca31a6c1d3

    SHA1

    76a1fc6ba4cdf4f9ea9bbeaeb97ffc97bf3ab2fa

    SHA256

    7bdcd2e0c2aa34c1bc405d0aeb1a77ac631b3af87422425def4e38c7dd278f5f

    SHA512

    52e435fbf4f0cf84e84b90729f5270099d89dfab42b74365900bb59b858b59cffc639f0774f7f561c74c0ff9f15c8865999173467466b6597e62c9501c15877e

  • C:\Users\Admin\AppData\Roaming\qmacro\qdisp.dll

    Filesize

    41KB

    MD5

    55672394cb568d39230a19ca31a6c1d3

    SHA1

    76a1fc6ba4cdf4f9ea9bbeaeb97ffc97bf3ab2fa

    SHA256

    7bdcd2e0c2aa34c1bc405d0aeb1a77ac631b3af87422425def4e38c7dd278f5f

    SHA512

    52e435fbf4f0cf84e84b90729f5270099d89dfab42b74365900bb59b858b59cffc639f0774f7f561c74c0ff9f15c8865999173467466b6597e62c9501c15877e

  • C:\Users\Admin\AppData\Roaming\qmacro\qdisp.dll

    Filesize

    41KB

    MD5

    55672394cb568d39230a19ca31a6c1d3

    SHA1

    76a1fc6ba4cdf4f9ea9bbeaeb97ffc97bf3ab2fa

    SHA256

    7bdcd2e0c2aa34c1bc405d0aeb1a77ac631b3af87422425def4e38c7dd278f5f

    SHA512

    52e435fbf4f0cf84e84b90729f5270099d89dfab42b74365900bb59b858b59cffc639f0774f7f561c74c0ff9f15c8865999173467466b6597e62c9501c15877e

  • memory/4632-40-0x0000000003A20000-0x0000000003A2A000-memory.dmp

    Filesize

    40KB

  • memory/4632-64-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/4632-67-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/4632-89-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB

  • memory/4632-109-0x0000000000400000-0x0000000000653000-memory.dmp

    Filesize

    2.3MB