Analysis

  • max time kernel
    288s
  • max time network
    320s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-11-2023 19:21

General

  • Target

    IDA Pro 8.3/IDA Pro 8.3 (x86, x86_64)/ida.exe

  • Size

    4.0MB

  • MD5

    05c7e465d9d88e94e064a99dc36f4ce1

  • SHA1

    e87ccd7bcfa05a30aa283c5e5953ba368ff75bed

  • SHA256

    d2650a12440bdc4f1b34456956221764c249060e808194b79152e9f679dd4e85

  • SHA512

    a9af650ea3518f88c5f8d9e1d059fd039c88d70b733ccec4107f75b14b6d9489a79dffa3ff5fbd7343ebeeb0ae90d26cdac64b79da006b5cb0c25316a66aacc4

  • SSDEEP

    49152:5MPnm/Zi34DKYj0ZkO4+XTcSq8EQtezdGfPko7FjOeBfDMmpwfFcnQOh6H6RBvV9:5smOqjcXA0nexReBv6avGBXMi+7Wg

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IDA Pro 8.3\IDA Pro 8.3 (x86, x86_64)\ida.exe
    "C:\Users\Admin\AppData\Local\Temp\IDA Pro 8.3\IDA Pro 8.3 (x86, x86_64)\ida.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4156
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3f4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\downlevel\api-ms-win-core-datetime-l1-1-0.dll.id0

    Filesize

    16KB

    MD5

    c4d1ccd6d1ed0276b6b3529441acc387

    SHA1

    3f8f1ec2600be3c051f8fdb0502b936bfaa945fd

    SHA256

    49a4367f6db737ceecd36e3a2721dba22bbd806d39720d92e44c2413af80b3f1

    SHA512

    b1372c47fafcb583bcfe178ff0b9cf66b774e0164975d1bfdbad243e1edfb704cfd1c7372adef21979561683450adb6d37ad60aa925d0a4a8f6168addb81fc95

  • C:\Windows\System32\acproxy.dll.id0

    Filesize

    16KB

    MD5

    802c80585cb50d1e1641250b4883ea67

    SHA1

    39287bd501ffc0864b9d55bb1e1a0a26efdbbf52

    SHA256

    36bf75c3661d50ed520c7b4f0cf1a031518e93da1a6c37e2e2381e9335d30b43

    SHA512

    c8aa54bdb3b1f393732e8870e51078bca0fbe659d1cb2e782ef44cbcb69ff9b2743850176c13a0bc4992136018d6d2083353e1da1e922eee68d130a4a2b12fb8

  • memory/4156-0-0x00007FF6CCEE0000-0x00007FF6CD2E0000-memory.dmp

    Filesize

    4.0MB

  • memory/4156-1-0x00007FFAD4380000-0x00007FFAD48D8000-memory.dmp

    Filesize

    5.3MB

  • memory/4156-2-0x0000025146AA0000-0x0000025146AB0000-memory.dmp

    Filesize

    64KB