Analysis

  • max time kernel
    216s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2023, 19:42

General

  • Target

    a5a0fdd945fce310ce86428c2c4c5f20_exe32.exe

  • Size

    91KB

  • MD5

    a5a0fdd945fce310ce86428c2c4c5f20

  • SHA1

    58d41b3594e8338eef0a38e9fe0ca904b2fe01b2

  • SHA256

    c4055410021f0cfc4abd5cd6d37ad77132b7c5fe32bf29ebf99a09b17124e06f

  • SHA512

    dcebcdefa1a3e193a939a2d8c32db9e27c8456092c2b329538a3399319f98bce22a3f338cca20bec3ea16528a30c51e556fce055be2472ae86faf756fb8e58f1

  • SSDEEP

    1536:jRsjdEIUFC2p79OCnouy8VD1RsjdEIUFC2p79OCnouy8VDk:jOm9Cshoutd1Om9Cshoutdk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 12 IoCs
  • UPX packed file 35 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5a0fdd945fce310ce86428c2c4c5f20_exe32.exe
    "C:\Users\Admin\AppData\Local\Temp\a5a0fdd945fce310ce86428c2c4c5f20_exe32.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2468
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2700
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2844
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:744
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1476
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1652
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:580
  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    230KB

    MD5

    e532ecb715676a97acde79c769e790b3

    SHA1

    18809b766dc34c341468f84dba4291ea20fe2452

    SHA256

    6dd37806341e0fb42ee6411bd4121bcf15cf614599c29b8e7da1a10ece768154

    SHA512

    196d7aff156b786ab642b0930a9ce653458d91c287df01a02f6390a3cb6885d7a13e449191b84ede66ae71982fe5c06500507b7b5b7a66a28b18ad5c4de6443b

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    138c8a113177de0440af2bbe7fec52cb

    SHA1

    ec6f26f76a953e9f32d78ee1ba587174abbee1bf

    SHA256

    ceab737b7aded902833b3b6e0e08b1c93eed3897c85ea1d00732d3f18ee66b21

    SHA512

    f5a22b785825f8386f060622d0fc287b6d18501b3960018a43612a1c9c2293f45d5454f62aada65a58da0488d29c4d6f73bacf39edb74937d76fc90c2a5d1b8e

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    235KB

    MD5

    d0c6ef0890bca267b6b280a84a059154

    SHA1

    493485ce22b912791cf89522c6a0342e9f312110

    SHA256

    62ac0673072921f1e6fa6e64ce4b09ae0012042904ba2a9bd79ce555ffb6a0d0

    SHA512

    89c4446691a6d52da964f31855481812f2e1c5101c694573b869057e879e652a460773136763d32c317ffad072d76d354d706b5d4b2b5739f826d9f5a5ae2d8b

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    235KB

    MD5

    6e3c073fa1ab80767895fe6100ae7a17

    SHA1

    4f32b9e9a53894ebeba90d625676e349f5ad9e04

    SHA256

    e51dd87c538e5f038a9bab7ccb187cc395deaf9169ed12691f43ed5ac9a0c4bb

    SHA512

    96a945128a2a62521a6b305390c29d27b5d0045b6b11d755c444603197af0e4d1072c6631bf40c3cad504ee3e00ff32743f093a620343bb64e08aadcde402b9d

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    c065f9e238435dc4a298f6c6b735958f

    SHA1

    2f7cb2e6505af4b4de5adba344c6dd37cc1a159c

    SHA256

    fb97e1c52e1b21c388c8bc142023b463744114024c861572020d7d4d14228c0f

    SHA512

    cd2df9b6a98d2a1be79ac3de87d282c773d49c5e0a91704094a5e0e53f058ef80db51947f50997f41fd313b8547fc5124f9480561e56a704261cfbe3a3e93581

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    094fdf4e65d9a3fcd050297e3e62d204

    SHA1

    c88c49c0851d49ad2a49759ef0d206b5670576a2

    SHA256

    39e97afc827efcde5fe2fba22adebc8ab5a44bf1b024be3f07b87c6434aa3192

    SHA512

    b601993cc4e4aafb44b580e1a18acaf6b4007fe9209c51a0723e6c9994a00229a1ad6f2884f89d780215635bc94690f8a0d3e64cb08ae46fb17086245da311e7

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    df9056b026db5349bbd031f292aa9379

    SHA1

    e19aecd72975c20fb797abe450ab3faacecaaed9

    SHA256

    c1b43b09027022780d24462c3f14ac95cc47cde4eda85997a9127abbe88b33d6

    SHA512

    e8f8d2906ba9eb7fd69514e130073a1ac385b242fa0c973f0b4e504fffc7d5166e232dda219c777965ec3ce8071fd851a872355f4c07de1f9fbcb0e8721299e8

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    a17bd96c6756a5ebbb830b5c94e10b9e

    SHA1

    7a1155e664c00a95af320dcfbb483e3043381503

    SHA256

    fdbcb48e807faafe2b1dad552b6e4ee6db14e669590512ed8380ed2c1d8327e6

    SHA512

    fc1dc54914ec599441875af67873ba8dd9351aa134abf25ea00bd7ceac6eace6b5db0d14943f44757e92b02e7a9291aeb80a85eba448ac7df74493478bed04a1

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    e763cbc85e0658cdc78c4ff39e5ab1c4

    SHA1

    e3c9c4a950b366a4a05c3a013457d288c688006b

    SHA256

    4a84cae7938bc3717f6b819100417c23a87166dd1a3c84e41926ac2f236f8779

    SHA512

    4a244ba71dc69157aa32fa7d305df1a32be21f0b24cd21317e21eaa63cb3ec727f8fff8c3441735f67c61ac4e6e605439571d274f03ed3d400dadb2e49b6b0d7

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    a5a0fdd945fce310ce86428c2c4c5f20

    SHA1

    58d41b3594e8338eef0a38e9fe0ca904b2fe01b2

    SHA256

    c4055410021f0cfc4abd5cd6d37ad77132b7c5fe32bf29ebf99a09b17124e06f

    SHA512

    dcebcdefa1a3e193a939a2d8c32db9e27c8456092c2b329538a3399319f98bce22a3f338cca20bec3ea16528a30c51e556fce055be2472ae86faf756fb8e58f1

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    347eadb6e57eb9a013ef5339cbf11683

    SHA1

    c10d333f2ae9d87e46c53b84118aba32acd118a0

    SHA256

    1931ac88b968a99577535ea27a85c9bcc6b0f26d5103b2c4d7d195c31da6e6a6

    SHA512

    3754fdeb6bc2b27ebefcc303e9cdb6503df14021b66888d29e03d3e714c8424a208745f4172621bc911a1ff8773383604893e85adfcac9cd1ff31781e238df62

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    718bf92c1e438b92f1972ef71b026112

    SHA1

    86aa5cf7bd07a314fd32dad66217576a414b72e8

    SHA256

    3484780b64f363ce3914636c11fcc20a86afa626c2d92980c06e449c9cc340bf

    SHA512

    5317483de521fbd3007b86a17ee677b5389bcc55e3ee34d14a184032fda5014a1cb984681412385cf6b4098cdd33151a4c563a5efd44ce1e94e785cf0bf3d1dd

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    c065f9e238435dc4a298f6c6b735958f

    SHA1

    2f7cb2e6505af4b4de5adba344c6dd37cc1a159c

    SHA256

    fb97e1c52e1b21c388c8bc142023b463744114024c861572020d7d4d14228c0f

    SHA512

    cd2df9b6a98d2a1be79ac3de87d282c773d49c5e0a91704094a5e0e53f058ef80db51947f50997f41fd313b8547fc5124f9480561e56a704261cfbe3a3e93581

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    c065f9e238435dc4a298f6c6b735958f

    SHA1

    2f7cb2e6505af4b4de5adba344c6dd37cc1a159c

    SHA256

    fb97e1c52e1b21c388c8bc142023b463744114024c861572020d7d4d14228c0f

    SHA512

    cd2df9b6a98d2a1be79ac3de87d282c773d49c5e0a91704094a5e0e53f058ef80db51947f50997f41fd313b8547fc5124f9480561e56a704261cfbe3a3e93581

  • \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    094fdf4e65d9a3fcd050297e3e62d204

    SHA1

    c88c49c0851d49ad2a49759ef0d206b5670576a2

    SHA256

    39e97afc827efcde5fe2fba22adebc8ab5a44bf1b024be3f07b87c6434aa3192

    SHA512

    b601993cc4e4aafb44b580e1a18acaf6b4007fe9209c51a0723e6c9994a00229a1ad6f2884f89d780215635bc94690f8a0d3e64cb08ae46fb17086245da311e7

  • \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    094fdf4e65d9a3fcd050297e3e62d204

    SHA1

    c88c49c0851d49ad2a49759ef0d206b5670576a2

    SHA256

    39e97afc827efcde5fe2fba22adebc8ab5a44bf1b024be3f07b87c6434aa3192

    SHA512

    b601993cc4e4aafb44b580e1a18acaf6b4007fe9209c51a0723e6c9994a00229a1ad6f2884f89d780215635bc94690f8a0d3e64cb08ae46fb17086245da311e7

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    df9056b026db5349bbd031f292aa9379

    SHA1

    e19aecd72975c20fb797abe450ab3faacecaaed9

    SHA256

    c1b43b09027022780d24462c3f14ac95cc47cde4eda85997a9127abbe88b33d6

    SHA512

    e8f8d2906ba9eb7fd69514e130073a1ac385b242fa0c973f0b4e504fffc7d5166e232dda219c777965ec3ce8071fd851a872355f4c07de1f9fbcb0e8721299e8

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    df9056b026db5349bbd031f292aa9379

    SHA1

    e19aecd72975c20fb797abe450ab3faacecaaed9

    SHA256

    c1b43b09027022780d24462c3f14ac95cc47cde4eda85997a9127abbe88b33d6

    SHA512

    e8f8d2906ba9eb7fd69514e130073a1ac385b242fa0c973f0b4e504fffc7d5166e232dda219c777965ec3ce8071fd851a872355f4c07de1f9fbcb0e8721299e8

  • \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    a17bd96c6756a5ebbb830b5c94e10b9e

    SHA1

    7a1155e664c00a95af320dcfbb483e3043381503

    SHA256

    fdbcb48e807faafe2b1dad552b6e4ee6db14e669590512ed8380ed2c1d8327e6

    SHA512

    fc1dc54914ec599441875af67873ba8dd9351aa134abf25ea00bd7ceac6eace6b5db0d14943f44757e92b02e7a9291aeb80a85eba448ac7df74493478bed04a1

  • \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    a17bd96c6756a5ebbb830b5c94e10b9e

    SHA1

    7a1155e664c00a95af320dcfbb483e3043381503

    SHA256

    fdbcb48e807faafe2b1dad552b6e4ee6db14e669590512ed8380ed2c1d8327e6

    SHA512

    fc1dc54914ec599441875af67873ba8dd9351aa134abf25ea00bd7ceac6eace6b5db0d14943f44757e92b02e7a9291aeb80a85eba448ac7df74493478bed04a1

  • \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    e763cbc85e0658cdc78c4ff39e5ab1c4

    SHA1

    e3c9c4a950b366a4a05c3a013457d288c688006b

    SHA256

    4a84cae7938bc3717f6b819100417c23a87166dd1a3c84e41926ac2f236f8779

    SHA512

    4a244ba71dc69157aa32fa7d305df1a32be21f0b24cd21317e21eaa63cb3ec727f8fff8c3441735f67c61ac4e6e605439571d274f03ed3d400dadb2e49b6b0d7

  • \Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    e763cbc85e0658cdc78c4ff39e5ab1c4

    SHA1

    e3c9c4a950b366a4a05c3a013457d288c688006b

    SHA256

    4a84cae7938bc3717f6b819100417c23a87166dd1a3c84e41926ac2f236f8779

    SHA512

    4a244ba71dc69157aa32fa7d305df1a32be21f0b24cd21317e21eaa63cb3ec727f8fff8c3441735f67c61ac4e6e605439571d274f03ed3d400dadb2e49b6b0d7

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    347eadb6e57eb9a013ef5339cbf11683

    SHA1

    c10d333f2ae9d87e46c53b84118aba32acd118a0

    SHA256

    1931ac88b968a99577535ea27a85c9bcc6b0f26d5103b2c4d7d195c31da6e6a6

    SHA512

    3754fdeb6bc2b27ebefcc303e9cdb6503df14021b66888d29e03d3e714c8424a208745f4172621bc911a1ff8773383604893e85adfcac9cd1ff31781e238df62

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    347eadb6e57eb9a013ef5339cbf11683

    SHA1

    c10d333f2ae9d87e46c53b84118aba32acd118a0

    SHA256

    1931ac88b968a99577535ea27a85c9bcc6b0f26d5103b2c4d7d195c31da6e6a6

    SHA512

    3754fdeb6bc2b27ebefcc303e9cdb6503df14021b66888d29e03d3e714c8424a208745f4172621bc911a1ff8773383604893e85adfcac9cd1ff31781e238df62

  • memory/580-130-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/744-89-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1476-103-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1652-123-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1652-112-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1652-117-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2084-152-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2084-260-0x000000006C831000-0x000000006C832000-memory.dmp

    Filesize

    4KB

  • memory/2084-237-0x00000000738FD000-0x0000000073908000-memory.dmp

    Filesize

    44KB

  • memory/2084-153-0x00000000738FD000-0x0000000073908000-memory.dmp

    Filesize

    44KB

  • memory/2468-59-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2468-55-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2700-68-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2708-124-0x00000000024E0000-0x000000000250F000-memory.dmp

    Filesize

    188KB

  • memory/2708-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2708-75-0x00000000024E0000-0x000000000250F000-memory.dmp

    Filesize

    188KB

  • memory/2708-54-0x00000000024E0000-0x000000000250F000-memory.dmp

    Filesize

    188KB

  • memory/2708-6-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2708-4-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2708-235-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2708-236-0x00000000024E0000-0x000000000250F000-memory.dmp

    Filesize

    188KB

  • memory/2708-108-0x00000000024E0000-0x000000000250F000-memory.dmp

    Filesize

    188KB

  • memory/2708-114-0x00000000024E0000-0x000000000250F000-memory.dmp

    Filesize

    188KB

  • memory/2708-3-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2844-79-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB