Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/12/2023, 10:56

General

  • Target

    0e6386e5dc052759bf904ff4320b38a8.exe

  • Size

    7.9MB

  • MD5

    0e6386e5dc052759bf904ff4320b38a8

  • SHA1

    0e9c47ef6fcb8193ab610edef7b3bd3532a432f9

  • SHA256

    efa68a1d46d22e8d61394a1905e8c539cb909805d4128355093111d7f22acf27

  • SHA512

    df2a0c8046cc3075f220501ce99b997c624090c2e63ac48f329361cdd59493933f2e2288a8f7d9befec96afc195a48c0d3ea8fbf5c5df24add93331635ca9431

  • SSDEEP

    196608:0Oazg7DS8Oazg7DS8Oazg7DS8Oazg7DSv:sg7uEg7uEg7uEg7uv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e6386e5dc052759bf904ff4320b38a8.exe
    "C:\Users\Admin\AppData\Local\Temp\0e6386e5dc052759bf904ff4320b38a8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Windows\SysWOW64\reg.exe
      "C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f
      2⤵
      • Adds Run key to start application
      • Modifies registry key
      PID:2712
    • C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe
      "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe
        "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2920
    • C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe
      "C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2956

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe

          Filesize

          3.5MB

          MD5

          c1ae195d42fe85aed6a7f409a584a35b

          SHA1

          db5154473d77b591885a60f41ba42335903817b0

          SHA256

          f96e4db4b460d75a3d5336c4455d143a437742d528b74f736cc59cfda305cd63

          SHA512

          e93a346fb4ac4cc0fbccf3a1dc30a2f02bec6b7763c227da302c4add39fb8c5f955f4ceaadda350e60264b8ec9fe57d2f799ba390a27761f31035a7d922cea75

        • C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe

          Filesize

          640KB

          MD5

          dd69873b774093597e78e6f105329f17

          SHA1

          9f1219fe92ea91563c561e7c9f1706bf5b31176f

          SHA256

          f0e7696cc280effcd351c2c61b03670f26e8f3f4b6cf1d8e1630c188cdabb057

          SHA512

          be3ac421aecfb19985cd08d9b3c48ab6d54354fd8f9d75a98605778f7ee539d4c207676ab8566b418a7c564371e1ebaa9b41fff2eee8b869db7a48d7951e7b3f

        • C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe

          Filesize

          7.9MB

          MD5

          534a730ab202db0f2f30a5d844cdb002

          SHA1

          a0416f17dea4519728bde7106bde091a4fd2e00a

          SHA256

          eb3e9bbb49985623340eb9a22b9a9e07118f8e7fbef4a64fbe4447b4fe1c2ded

          SHA512

          6a2bfa7a5464bf360ea11861a5c74afe79a46dd67360740200e8022fb70e3499b4db43bf6acfb96ea31544df65a16f1b224c1910461d2a76de101e257ca15aa1

        • C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe

          Filesize

          2.7MB

          MD5

          f5b7cb93d07a444a21cc08267974278a

          SHA1

          fd2b8a6d162c963ecf0216adfdf1a0d28ae00b4a

          SHA256

          ad3eff6c8595af785d5c2dd9e3e02d6fe5f51d553d2b8bc59b68d95b105db17f

          SHA512

          9880d62879368695d0af3f6d08dec3d2c9406965619c1ea440f81bbfd4bd7c3216a401734edb65ee06bd5469329738e596e4628c36fb9f14b9142263b39abc62

        • C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe

          Filesize

          1.0MB

          MD5

          a2f259ceb892d3b0d1d121997c8927e3

          SHA1

          6e0a7239822b8d365d690a314f231286355f6cc6

          SHA256

          ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420

          SHA512

          5ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad

        • \Users\Admin\AppData\Roaming\7D57AD13E21.exe

          Filesize

          2.6MB

          MD5

          b657638213e762002e381280010148be

          SHA1

          38c0add26cc93653c3e421b7d5e324afc1260b1c

          SHA256

          afc3283969460aca917571786a006ca0d773c1f0f531989f77b4f8d858590d29

          SHA512

          78f9f80c82fc99e2ce8bd347848f66e9217b2393c7f9649f9859157b204f324b3bb5811bf9ebc896cffef7d5dde087bf8d200f005fe87535792673a134e60668

        • \Users\Admin\AppData\Roaming\7D57AD13E21.exe

          Filesize

          2.2MB

          MD5

          f5f127b2d0ab8e61db728b0da1e86847

          SHA1

          bac92dcba690e4419a55c3fbc472908c9992a888

          SHA256

          12d00ecfc9e067746c6e6acc604460798b56db7b73a612bd1e02c0f725155882

          SHA512

          675a9f89f60c8193ce11ad49345dd5f5511cd02ec5730bfa4f05278553341b5ca47e6427139a3363d225c626c54f75c4c1831af5e7784772eb171694bf9cb9b1

        • memory/2920-58-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/2920-54-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/2920-55-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2920-52-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/2920-61-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2920-44-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/2920-46-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2920-51-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/2920-48-0x0000000000400000-0x00000000004A6000-memory.dmp

          Filesize

          664KB

        • memory/2956-56-0x00000000001C0000-0x00000000001C1000-memory.dmp

          Filesize

          4KB

        • memory/2956-22-0x00000000001C0000-0x00000000001C1000-memory.dmp

          Filesize

          4KB

        • memory/2956-27-0x0000000000270000-0x0000000000271000-memory.dmp

          Filesize

          4KB

        • memory/2956-42-0x0000000000400000-0x00000000004FB000-memory.dmp

          Filesize

          1004KB

        • memory/2972-21-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2972-50-0x0000000000400000-0x0000000000601000-memory.dmp

          Filesize

          2.0MB

        • memory/2972-41-0x0000000000400000-0x0000000000601000-memory.dmp

          Filesize

          2.0MB

        • memory/3020-20-0x0000000000400000-0x0000000000601000-memory.dmp

          Filesize

          2.0MB

        • memory/3020-13-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/3020-0-0x00000000003A0000-0x00000000003A1000-memory.dmp

          Filesize

          4KB

        • memory/3020-4-0x0000000000400000-0x0000000000601000-memory.dmp

          Filesize

          2.0MB

        • memory/3020-1-0x0000000000400000-0x0000000000601000-memory.dmp

          Filesize

          2.0MB