Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    14/11/2023, 18:52

General

  • Target

    29ab2d345e8f0ba86bd4ca3828be63c30f05ccce8715e0f6541031487344e1bb.exe

  • Size

    4.0MB

  • MD5

    f6d1ed5bbdde3d0a5d4aa15a5f7b9fa2

  • SHA1

    423018ecda6e51cbf761e9834e6abe354d7f60fe

  • SHA256

    29ab2d345e8f0ba86bd4ca3828be63c30f05ccce8715e0f6541031487344e1bb

  • SHA512

    b634875782a4da73ea8cbfdc7255868d9d946d6c278a356a1d6541304f1fb4247d0086941e732fc8c1559fca1221b214235ca90b9e66f57eb1bb6adb244a7368

  • SSDEEP

    49152:MNcTFwt6iRKkif7durHPiRKk9zbFwih/EiRKkif7durHPiRKkbNy9qUeTyiRKK:ar9Ruf7lRJz2qRuf7lRvNy9NmPRF

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\29ab2d345e8f0ba86bd4ca3828be63c30f05ccce8715e0f6541031487344e1bb.exe
    "C:\Users\Admin\AppData\Local\Temp\29ab2d345e8f0ba86bd4ca3828be63c30f05ccce8715e0f6541031487344e1bb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\29ab2d345e8f0ba86bd4ca3828be63c30f05ccce8715e0f6541031487344e1bb.exe
      C:\Users\Admin\AppData\Local\Temp\29ab2d345e8f0ba86bd4ca3828be63c30f05ccce8715e0f6541031487344e1bb.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • System policy modification
      PID:2728
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:3020
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2412

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\29ab2d345e8f0ba86bd4ca3828be63c30f05ccce8715e0f6541031487344e1bb.exe

      Filesize

      4.0MB

      MD5

      5c768fef0fcf2c224ca4ae2fab632842

      SHA1

      b17f219d7ae93c32015128b70529846e9f5d7791

      SHA256

      0ca42204ab190ccc7c015de2c960e9aed577eb41e591da51c2e4c9305c01df24

      SHA512

      b76b52c2c7b3665180aed40772be7bf34e3bd084ef4657a2c295f215a36c92fb1d359cd9fff9784f2b44bb4a8429a471d8c0d39eae3a2bd9eccacb42a7a8a5fa

    • C:\Users\Admin\AppData\Local\Temp\Cab9B67.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar9BB8.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • \Users\Admin\AppData\Local\Temp\29ab2d345e8f0ba86bd4ca3828be63c30f05ccce8715e0f6541031487344e1bb.exe

      Filesize

      4.0MB

      MD5

      5c768fef0fcf2c224ca4ae2fab632842

      SHA1

      b17f219d7ae93c32015128b70529846e9f5d7791

      SHA256

      0ca42204ab190ccc7c015de2c960e9aed577eb41e591da51c2e4c9305c01df24

      SHA512

      b76b52c2c7b3665180aed40772be7bf34e3bd084ef4657a2c295f215a36c92fb1d359cd9fff9784f2b44bb4a8429a471d8c0d39eae3a2bd9eccacb42a7a8a5fa

    • memory/2156-9-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/2156-6-0x0000000002CA0000-0x0000000002D12000-memory.dmp

      Filesize

      456KB

    • memory/2156-0-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/2412-63-0x0000000003E50000-0x0000000003E51000-memory.dmp

      Filesize

      4KB

    • memory/2412-64-0x0000000003E50000-0x0000000003E51000-memory.dmp

      Filesize

      4KB

    • memory/2728-12-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/2728-13-0x0000000000120000-0x0000000000192000-memory.dmp

      Filesize

      456KB

    • memory/2728-20-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/2728-11-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/2728-61-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB