Analysis

  • max time kernel
    151s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2023, 01:01

General

  • Target

    790e94a172413951c8ea0706e310d9f305e0563f734102e54e1340b82691a994.exe

  • Size

    9.6MB

  • MD5

    8bbf32652f6abb02f0a7f2a685c05fb1

  • SHA1

    df2a98d438b6f1335e48f24a4a0db3905b8be7a8

  • SHA256

    790e94a172413951c8ea0706e310d9f305e0563f734102e54e1340b82691a994

  • SHA512

    85e72b9ae43abff1e4ae6da697c0988b64da543f9d1a2a122a12c95f3f6d328d71be723d7990ddc783892ae76d1a065b58e7277cc472dd27e527f01d858be610

  • SSDEEP

    98304:rB2+2HuJMe8d1XdhBiiMaHB2+2HuJMe8d1XdhBiiMatQ3YI+W:rKiMeoikHKiMeoiktQoI+W

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\790e94a172413951c8ea0706e310d9f305e0563f734102e54e1340b82691a994.exe
    "C:\Users\Admin\AppData\Local\Temp\790e94a172413951c8ea0706e310d9f305e0563f734102e54e1340b82691a994.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\UndoWait.exe

    Filesize

    9.8MB

    MD5

    4404438e8cfa0609e66bc09e456037af

    SHA1

    e5756649c7c5a76dc974529ed17a09b64389acd1

    SHA256

    37900c1437fc6792d5b5679b48271657b57366db6bb89e0e4234939289678c39

    SHA512

    7caa9a7876a3a6721d9a4f570386f0e8ffa2d902ff0a1227119db0a52f0996c2d17cddf15093c4c85bc2066d112b47c57e20bf8b98ad522907333ad270dcc39c