Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    16/11/2023, 05:38

General

  • Target

    4778e22a6c0699c3d9a63ac350e2c1b29b4cfaca65e282600193739ce0258394.exe

  • Size

    4.5MB

  • MD5

    dae2f0d08e24f48d50f9150bb926cf39

  • SHA1

    4412f3ff5dc81034f2dc1246e1343c25420da59c

  • SHA256

    4778e22a6c0699c3d9a63ac350e2c1b29b4cfaca65e282600193739ce0258394

  • SHA512

    7377fb786254af08d79b5a369ba2ad956828630394259bc791644ef73b988b91c36d98a17e81b80ba5e36e8fe095e9544932c2a13cbfd8027e77b381219515f2

  • SSDEEP

    98304:HXPPJ5EIqKe6q3oKbtRMv3tho3hahqOr9JajQbu2+NUzQ6lMU:/PjaKHAtmv3tho3hahqOrTajku2FzQ6W

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 15 IoCs
  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4778e22a6c0699c3d9a63ac350e2c1b29b4cfaca65e282600193739ce0258394.exe
    "C:\Users\Admin\AppData\Local\Temp\4778e22a6c0699c3d9a63ac350e2c1b29b4cfaca65e282600193739ce0258394.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\reg.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 scrrun.dll -s
        3⤵
        • Modifies registry class
        PID:2492
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 msstdfmt.dll -s
        3⤵
          PID:2508
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 COMDLG32.ocx -s
          3⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:2536
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 MSCOMCTL.ocx -s
          3⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          PID:2568
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 TABCTL32.OCX -s
          3⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:3056
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32 COMCTL32.ocx -s
          3⤵
          • Loads dropped DLL
          • Modifies registry class
          PID:2128

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\reg.bat

      Filesize

      183B

      MD5

      026cb7b5ebe20c232fcee11df1c2aa4a

      SHA1

      415b8ec42a7f668b00ba941fdef518fd0f346fef

      SHA256

      1f5b270df0376f3fb7a3124b809f166d18d6e82c09c930865b271e7fa3ef109c

      SHA512

      ae76dd3b68271ced21cc31517ad825457138630b8893b28b30fc3b83c513a9a429071c37e175523062a15b093c3981b12c3323874caf080e1d872f0202b7a320

    • C:\Users\Admin\AppData\Local\Temp\reg.bat

      Filesize

      183B

      MD5

      026cb7b5ebe20c232fcee11df1c2aa4a

      SHA1

      415b8ec42a7f668b00ba941fdef518fd0f346fef

      SHA256

      1f5b270df0376f3fb7a3124b809f166d18d6e82c09c930865b271e7fa3ef109c

      SHA512

      ae76dd3b68271ced21cc31517ad825457138630b8893b28b30fc3b83c513a9a429071c37e175523062a15b093c3981b12c3323874caf080e1d872f0202b7a320

    • C:\Windows\SysWOW64\COMCTL32.ocx

      Filesize

      595KB

      MD5

      17f1d8f9666c7c5eabe9f9a18d312841

      SHA1

      b5f9ff1c013cbad374c988a410ff98bb53a7f972

      SHA256

      45a2c828ea26033b75e71e9e9f1cb2028f4ae923f307b83da12f1837ba328644

      SHA512

      771c1635d691dfa0d4c514560bbecc46017efdd772eb21cd7ec982f837719826dffe99343aaeed0c4e1755a0e81f3ad6db2704063159e3777e0b6fb0357941ec

    • C:\Windows\SysWOW64\COMDLG32.ocx

      Filesize

      136KB

      MD5

      fdd53313fb364f0e8e4b217909cd5d61

      SHA1

      800fbec8a78bbda6ec03984958fd1bac9c5b768e

      SHA256

      118c3f4fae7c1867fc2af7f333aedfc28dbdb57e89cb586a3abda46e364242f8

      SHA512

      1a365f3f25334905282cbf28d99ad50d1f2eb9da9d3ad0d8ed8b28c45a357a7b381507f6a36ecb67c05c7fcbc02895ee23bfcca5b7b37faac0e09bdc5d7cdedf

    • C:\Windows\SysWOW64\TABCTL32.OCX

      Filesize

      218KB

      MD5

      dc925b6d77ba9ecb532e2f6750be943b

      SHA1

      f71215e701401f0dd6fe143e3a630b2e168a4fac

      SHA256

      d10a197fd53e65dc910ca4aed86cb674c613ff14ce6436d1a445bb27a7a499e0

      SHA512

      ee9c40e695a29de7e7b8a9fe1ca01ebba9a8bdc199d46d98c71a4e3ecfec566f2fc31300a5e9867e8c791b15ac3ebec076f0710e0f6eec6c3fdea3bde37ab171

    • \Windows\SysWOW64\COMCTL32.ocx

      Filesize

      595KB

      MD5

      17f1d8f9666c7c5eabe9f9a18d312841

      SHA1

      b5f9ff1c013cbad374c988a410ff98bb53a7f972

      SHA256

      45a2c828ea26033b75e71e9e9f1cb2028f4ae923f307b83da12f1837ba328644

      SHA512

      771c1635d691dfa0d4c514560bbecc46017efdd772eb21cd7ec982f837719826dffe99343aaeed0c4e1755a0e81f3ad6db2704063159e3777e0b6fb0357941ec

    • \Windows\SysWOW64\COMDLG32.ocx

      Filesize

      136KB

      MD5

      fdd53313fb364f0e8e4b217909cd5d61

      SHA1

      800fbec8a78bbda6ec03984958fd1bac9c5b768e

      SHA256

      118c3f4fae7c1867fc2af7f333aedfc28dbdb57e89cb586a3abda46e364242f8

      SHA512

      1a365f3f25334905282cbf28d99ad50d1f2eb9da9d3ad0d8ed8b28c45a357a7b381507f6a36ecb67c05c7fcbc02895ee23bfcca5b7b37faac0e09bdc5d7cdedf

    • \Windows\SysWOW64\TABCTL32.OCX

      Filesize

      218KB

      MD5

      dc925b6d77ba9ecb532e2f6750be943b

      SHA1

      f71215e701401f0dd6fe143e3a630b2e168a4fac

      SHA256

      d10a197fd53e65dc910ca4aed86cb674c613ff14ce6436d1a445bb27a7a499e0

      SHA512

      ee9c40e695a29de7e7b8a9fe1ca01ebba9a8bdc199d46d98c71a4e3ecfec566f2fc31300a5e9867e8c791b15ac3ebec076f0710e0f6eec6c3fdea3bde37ab171