Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2023 13:57

General

  • Target

    ee7104bcd2faaf2c6a466e52199463039ed73fb8de856e9b0d571915b74e15e9.exe

  • Size

    7.0MB

  • MD5

    fdf7ad31c9f76d711e9f8532062e4ab4

  • SHA1

    b0ddea7bfb8d9eb4f6c5d36416b3092dcf604e2f

  • SHA256

    ee7104bcd2faaf2c6a466e52199463039ed73fb8de856e9b0d571915b74e15e9

  • SHA512

    431954dda606caea8fdf0cde34e2a34e91b834c5fb53616897ccbb5cf77e378af3fbda990be6ec493eeebbe2586466eacd25a813c3a8a1a1805d1937d69fd3da

  • SSDEEP

    196608:hZYwZl+XfRjp9mZBw9999999JwY9K69996GNfl+7p1VC2UkM:hhlu9mZu9999999JN9K6999dL+1tM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee7104bcd2faaf2c6a466e52199463039ed73fb8de856e9b0d571915b74e15e9.exe
    "C:\Users\Admin\AppData\Local\Temp\ee7104bcd2faaf2c6a466e52199463039ed73fb8de856e9b0d571915b74e15e9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JVSetup.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JVSetup.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Windows\SysWOW64\msiexec.exe
        msiexec.exe /i"Microsoft Windows Journal Viewer.msi"
        3⤵
        • Enumerates connected drives
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:2816
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding C152560EB1C186E9C2DC24FC7DF43171 C
      2⤵
      • Loads dropped DLL
      PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JVSetup.exe

    Filesize

    35KB

    MD5

    0cfcb894c1c0ba2c6b9e57c7ca269e07

    SHA1

    0926790458f30a167e867fa6b7c9a3960511cf51

    SHA256

    e9540fa30ebcf6cbff7b1b438b48396604e3fbd03e089265ca513128275146d4

    SHA512

    22b9e880d8dac8d5845437739ebdb654314734ed38bb44a9b1aebaf7adfd5981239b29803b4b0ec54fe481649ff3941603513a652337f16c006d9e57b7f8c682

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\JVSetup.exe

    Filesize

    35KB

    MD5

    0cfcb894c1c0ba2c6b9e57c7ca269e07

    SHA1

    0926790458f30a167e867fa6b7c9a3960511cf51

    SHA256

    e9540fa30ebcf6cbff7b1b438b48396604e3fbd03e089265ca513128275146d4

    SHA512

    22b9e880d8dac8d5845437739ebdb654314734ed38bb44a9b1aebaf7adfd5981239b29803b4b0ec54fe481649ff3941603513a652337f16c006d9e57b7f8c682

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Microsoft Windows Journal Viewer.msi

    Filesize

    5.6MB

    MD5

    5ed4cecfa302f336c4ea93272dff1fdb

    SHA1

    45743995a209d8f9721d59ce0bd5d16093c3a392

    SHA256

    53dd92c4af84f961568e3499d68b3429ba9c40649afc1aa3f88971b52c29c802

    SHA512

    220bbd207dbd9b3a2c2cc301869ff50fb5af7d8240cb9e96282b1a88af335cc124c69e10eed78abdef559c4f1119a48e646d95e57f77ad3ad9b1eb3798c877e4

  • C:\Users\Admin\AppData\Local\Temp\MSI391A.tmp

    Filesize

    16KB

    MD5

    81e2bdf1be54b13aea5b26a995d26f4f

    SHA1

    245f568cc208d64d56f6bfc2951ffad8e59e7f1f

    SHA256

    19ce6a6e6ab7d331a612950963bae2ee4e65bc66398aea74423edda4d0f748be

    SHA512

    e6c0cb965e3307bcf0e5b00c46873062bbffa8bdf8dcd707512504f8e15ff39e38666169dde3c463a467a00bde7029c8229b2a253a06c01b416fce08b17b20dd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\JVSetup.exe

    Filesize

    35KB

    MD5

    0cfcb894c1c0ba2c6b9e57c7ca269e07

    SHA1

    0926790458f30a167e867fa6b7c9a3960511cf51

    SHA256

    e9540fa30ebcf6cbff7b1b438b48396604e3fbd03e089265ca513128275146d4

    SHA512

    22b9e880d8dac8d5845437739ebdb654314734ed38bb44a9b1aebaf7adfd5981239b29803b4b0ec54fe481649ff3941603513a652337f16c006d9e57b7f8c682

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\JVSetup.exe

    Filesize

    35KB

    MD5

    0cfcb894c1c0ba2c6b9e57c7ca269e07

    SHA1

    0926790458f30a167e867fa6b7c9a3960511cf51

    SHA256

    e9540fa30ebcf6cbff7b1b438b48396604e3fbd03e089265ca513128275146d4

    SHA512

    22b9e880d8dac8d5845437739ebdb654314734ed38bb44a9b1aebaf7adfd5981239b29803b4b0ec54fe481649ff3941603513a652337f16c006d9e57b7f8c682

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\JVSetup.exe

    Filesize

    35KB

    MD5

    0cfcb894c1c0ba2c6b9e57c7ca269e07

    SHA1

    0926790458f30a167e867fa6b7c9a3960511cf51

    SHA256

    e9540fa30ebcf6cbff7b1b438b48396604e3fbd03e089265ca513128275146d4

    SHA512

    22b9e880d8dac8d5845437739ebdb654314734ed38bb44a9b1aebaf7adfd5981239b29803b4b0ec54fe481649ff3941603513a652337f16c006d9e57b7f8c682

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\JVSetup.exe

    Filesize

    35KB

    MD5

    0cfcb894c1c0ba2c6b9e57c7ca269e07

    SHA1

    0926790458f30a167e867fa6b7c9a3960511cf51

    SHA256

    e9540fa30ebcf6cbff7b1b438b48396604e3fbd03e089265ca513128275146d4

    SHA512

    22b9e880d8dac8d5845437739ebdb654314734ed38bb44a9b1aebaf7adfd5981239b29803b4b0ec54fe481649ff3941603513a652337f16c006d9e57b7f8c682

  • \Users\Admin\AppData\Local\Temp\MSI391A.tmp

    Filesize

    16KB

    MD5

    81e2bdf1be54b13aea5b26a995d26f4f

    SHA1

    245f568cc208d64d56f6bfc2951ffad8e59e7f1f

    SHA256

    19ce6a6e6ab7d331a612950963bae2ee4e65bc66398aea74423edda4d0f748be

    SHA512

    e6c0cb965e3307bcf0e5b00c46873062bbffa8bdf8dcd707512504f8e15ff39e38666169dde3c463a467a00bde7029c8229b2a253a06c01b416fce08b17b20dd