Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2023 04:03

General

  • Target

    307679e733c5b2f1a2b68c6e6ca385080d15395a3884cc416af9b493d22be6ef.exe

  • Size

    2.8MB

  • MD5

    cd9fba471821f09ba15e691a4a2e99c9

  • SHA1

    d62bb9be5d8b17f88167491351e16a7c846e2b19

  • SHA256

    307679e733c5b2f1a2b68c6e6ca385080d15395a3884cc416af9b493d22be6ef

  • SHA512

    5c0753810c010439f0a836e9d4227319cb9af99b996d6ab5100d533911d3849c4d575a5884c2c93575f114450a2ec6d0b9e6e86e204e91ffe266ccde19cb5590

  • SSDEEP

    49152:6pxKB2UqRbbEqBKhmxFPLD3Di/IMiugQDee8OsKC4H+Q8MN+nQKRPrv3MI/:jB2UqRAmxFPLD31OsZ4H+Q8MN8NZr3Mg

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Control Panel 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\307679e733c5b2f1a2b68c6e6ca385080d15395a3884cc416af9b493d22be6ef.exe
    "C:\Users\Admin\AppData\Local\Temp\307679e733c5b2f1a2b68c6e6ca385080d15395a3884cc416af9b493d22be6ef.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\mswinsck.ocx

    Filesize

    124KB

    MD5

    57325d394119db3d3b3cf8a3bbfda5ca

    SHA1

    91fc9a75807f8cd98c52d8804dada489bd187430

    SHA256

    b66e17e0d7bbfe4f6be537c544083e844b5dd0ebc660910bff17ad6cd5480971

    SHA512

    a6efdc59a999df797d3030042e62eb452e5ad87a19429fdaf4117fff1c85ff2e58015159c24b3c2e4c7fe97b601fcfe795fa3457da66b69b08eaf7e34ba5ad48

  • C:\Windows\SysWOW64\zipack.dll

    Filesize

    52KB

    MD5

    7d886442668d1c79ce95e172ae69cccf

    SHA1

    697e31d6bb0dba9d3a60efbd22f432230873c430

    SHA256

    afc7cf5b0772b27d05d224136739cd56d1ad07647d996cad97a7e2fe29ab86f1

    SHA512

    0aa2f753a0a47a139ad232a3bb9725554692fd176f21f25addba56aabcb150960c83d355e5505f37764b0e6da705f35cdd31e285ec13701150b1e3a1c0795955

  • memory/732-5-0x0000000002500000-0x0000000002527000-memory.dmp

    Filesize

    156KB