Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-12-2023 10:36

General

  • Target

    096442e4444682d673cb392c62586013.exe

  • Size

    160KB

  • MD5

    096442e4444682d673cb392c62586013

  • SHA1

    ddbd9a65ee61412a0e8acdda4f12655688f52ab5

  • SHA256

    2da066c7abd34e9a509c2112c2321a7c5f2047117472f2114cf157db038797eb

  • SHA512

    75e2df09b59b95c81bd09635cc459431c7a74d15cd1146e61cb4988a2c3af4606789938b40c8f788ca87656dda477a975ae76c31937a08106f54ce1ba48e7c36

  • SSDEEP

    768:85XL+uSmPVfY68eIRFhoJ0h4h2hQJVNjDkp57xXp5Rmg5Fh4hqhxOhDhzhnhvhzN:8tq968nnJh4h2hON6x5puwVT0B

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\096442e4444682d673cb392c62586013.exe
    "C:\Users\Admin\AppData\Local\Temp\096442e4444682d673cb392c62586013.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\xhqour.exe
      "C:\Users\Admin\xhqour.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\xhqour.exe

    Filesize

    160KB

    MD5

    2b01ada32517b9be0ac3b43c8a672364

    SHA1

    01eedba31803d0d1bb020a8efddc8830899b0deb

    SHA256

    4fc029d87efceab3bab4a2e3c59370de795592bf1fb8c39a78e0184e59a371cd

    SHA512

    ef40170371247011310b3dc4bb8429c3abf5a5739a01e3c34ada2b970229bcb647ef0670400615c5a276ee592260dff9d1377d690e185a8adf14b956f406f609