Analysis

  • max time kernel
    151s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2023 08:40

General

  • Target

    5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe

  • Size

    15.0MB

  • MD5

    3acc5df7619c684470f50ca23ece4d9a

  • SHA1

    dd6cecd0938930f54351b0b27766cbe7d0fa5332

  • SHA256

    5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187

  • SHA512

    9ade9edc3a6d6295800a4067f2713d287f27ac586b7b7be1b2247cfe815afb01d4ff2c0f658135581172a06655bb2f25879f54b03da2909baf6e29460ae2842e

  • SSDEEP

    393216:tp/+Kdf/OM/LK5+fpSJsypUAOQtogx4YqSsNrPO3tvrLIgU:mKd1TEJfpUAOQtog+S0S3tvXIJ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe
    "C:\Users\Admin\AppData\Local\Temp\5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2632
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\*41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exe"
      2⤵
        PID:3064
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del "C:\Users\Admin\AppData\Local\Temp\*.dll"
        2⤵
          PID:2292

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\37ca59ae6a26e48b78afb0f4eedb379f.ini

        Filesize

        2KB

        MD5

        545a41064c18070826f020cb91ac2b28

        SHA1

        2ca3c4ef583abd35374d2abb0ba24556d69c33de

        SHA256

        459c2e182ba61e9edbaca5f6798fd47a12b332ec003d7656255e1cbf6cb269ee

        SHA512

        2c24b94322e7c0426f4886a49ae18ddaf7d8f673f5dd2ad5eacec8e7f93c21d5f2fc0cde7631285e9584dbbfb9e84463256f82c7cbf7d76c04f07dff2773ab2f

      • C:\Users\Admin\AppData\Local\Temp\37ca59ae6a26e48b78afb0f4eedb379fA.ini

        Filesize

        1KB

        MD5

        049e037dd0d07c1ef5b0c1be96597185

        SHA1

        05371bffcd02fab2c60d418f5fb42f78d73ba0ba

        SHA256

        d416d91577fbdfaea035c062c57a8b5d4987dff7121cd74976d08f653fcaf034

        SHA512

        9aa5857cfbe60b405b33cd903ff558313c260ff0cb48969ff2edac68c94c70063ed96d7c23a1170af25f6a5320aa1c3d8b3d50f24ff2f3e79993082e09c9d192

      • C:\Users\Admin\AppData\Local\Temp\5eb41a84b7e6492b600970df07be1b5ad4b24c1dc4d85b3a2b3b3e2837842187.exepack.tmp

        Filesize

        2KB

        MD5

        a286d905fb8ee250ce61df1a81cd92e3

        SHA1

        d283637afd14c2f21db217ba939f5c4cce9d7938

        SHA256

        2aaccb3bd84c8a83bc0ba2ee4d57e866096f626e966329b4fa1aa5997ccaae4b

        SHA512

        f4765a6d66081feca9b4d490232c8cff931dba6b5429b72e354fece485da73209e9f898891697a8ff401581244606a8a511a60b359ee6ce7396b1e769e769689

      • memory/2632-354-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-356-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-2-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-1-0x0000000000240000-0x0000000000243000-memory.dmp

        Filesize

        12KB

      • memory/2632-341-0x0000000003BB0000-0x0000000003BC0000-memory.dmp

        Filesize

        64KB

      • memory/2632-350-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-351-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-352-0x0000000000240000-0x0000000000243000-memory.dmp

        Filesize

        12KB

      • memory/2632-353-0x0000000050000000-0x0000000050109000-memory.dmp

        Filesize

        1.0MB

      • memory/2632-0-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-355-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-5-0x0000000050000000-0x0000000050109000-memory.dmp

        Filesize

        1.0MB

      • memory/2632-357-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-359-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-362-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-363-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-364-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-365-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-366-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-367-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB

      • memory/2632-368-0x0000000000400000-0x0000000001FC9000-memory.dmp

        Filesize

        27.8MB