Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 09:50

General

  • Target

    64c96921dde3f9f4e7bd2a8317e4a8948ce2a567f16b0fdce4c76a51db86f0da.exe

  • Size

    10.3MB

  • MD5

    5db88ea4efb56b3a4ea60b384a96c7c7

  • SHA1

    52f48e8672eb473750acdbd12d8724dd333c02f2

  • SHA256

    64c96921dde3f9f4e7bd2a8317e4a8948ce2a567f16b0fdce4c76a51db86f0da

  • SHA512

    04c4429584e6f9fd8bdd5813a72ba5fc94668f0588972da84511f6af543ec1c5c133de868d02fbab3bf989ad08932bc26636f8a239e57490504e11105ccbf37a

  • SSDEEP

    196608:M8jh3GXOVCiXI2yFV0nEmsV+AoaHz9gDb6VeV4ziQDarQzcFJIloweKUoqd:jjJGSH428ms+AoaTyb4TDaEYweDl

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64c96921dde3f9f4e7bd2a8317e4a8948ce2a567f16b0fdce4c76a51db86f0da.exe
    "C:\Users\Admin\AppData\Local\Temp\64c96921dde3f9f4e7bd2a8317e4a8948ce2a567f16b0fdce4c76a51db86f0da.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\64c96921dde3f9f4e7bd2a8317e4a8948ce2a567f16b0fdce4c76a51db86f0da.exepack.tmp

    Filesize

    2KB

    MD5

    51677d5e2e6c352fd064568ff82f5c31

    SHA1

    09a105fb358e760bb8420edfed6ea8e73f06515e

    SHA256

    f4bf29f6175a45d3bd587d4819f58373a4ba0e325cb2f6ff405a02aa1d03bbef

    SHA512

    34444f53e0e01b6ed843ca3a4167401d517ca572cec395dce0c4aa4e0c502fa994082213465cc882ec0a69f2d159b1b45ed1e20baea2521cf44c0d3ee929f40d

  • C:\Users\Admin\AppData\Local\Temp\77aeb721555cbbf417e5660099c7f9f0.ini

    Filesize

    1KB

    MD5

    aa8589c951e7954487d7ca9219fd611b

    SHA1

    edc4415d01914ff68bbf449c01bf74ca1f8cf36f

    SHA256

    cb4d8ad736b0fdf282eda5e5738b2cdd507485038753c581641f25592d955fbc

    SHA512

    cc916be87e3c34ce2f85de731752896485a5e73aba7453245d6ef3bdce72942f9e8f1a0884954edfd67c3720048968f5bdfe16f708c5f56e7055cb69300e360b

  • C:\Users\Admin\AppData\Local\Temp\77aeb721555cbbf417e5660099c7f9f0A.ini

    Filesize

    1KB

    MD5

    36d40189c89b0aa2807575e7951c3803

    SHA1

    21bc06f06dd1fa0ba8bca7f46e251cbe6effbb50

    SHA256

    2161bc933a9ef7756082183dc3bd8b07755d7fcdf1887594392b4c8e1ef46d2e

    SHA512

    967d9bc35bb0f3b954e674eef6cb316194051484208e2ab8a67ec39d2b5aad273ff806e21e310c864b9a9ef549c3a841b573b3657452a1326248105b00e0b581

  • memory/2072-382-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-426-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-5-0x0000000050000000-0x0000000050109000-memory.dmp

    Filesize

    1.0MB

  • memory/2072-2-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-1-0x00000000001E0000-0x00000000001E3000-memory.dmp

    Filesize

    12KB

  • memory/2072-320-0x00000000001E0000-0x00000000001E3000-memory.dmp

    Filesize

    12KB

  • memory/2072-364-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-365-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-366-0x0000000002040000-0x0000000002050000-memory.dmp

    Filesize

    64KB

  • memory/2072-0-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-421-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-6-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-427-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-428-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-430-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-431-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-432-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-433-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-434-0x0000000002040000-0x0000000002050000-memory.dmp

    Filesize

    64KB

  • memory/2072-435-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB

  • memory/2072-436-0x0000000000400000-0x0000000001E94000-memory.dmp

    Filesize

    26.6MB