Analysis

  • max time kernel
    138s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/12/2023, 12:49

General

  • Target

    28853008022b9808fdceb25df33daff4.exe

  • Size

    430KB

  • MD5

    28853008022b9808fdceb25df33daff4

  • SHA1

    4eed2e4101364d6ac64efc188201089ef2afe29d

  • SHA256

    278cdd50bb6eccfddb20adf5af29e071e46804e82f6557a867bab2a716824129

  • SHA512

    be9b257fca64aac805f97df0b52d0e40351e10f4e65bb2e48a0b06cb495e272675526c91c1282f3d294de95e3bddb03592e88602bf0778939368740b777342aa

  • SSDEEP

    12288:ibee0PGl89WazvzkmMxM+ltxQMAn0Iv1b70ZSf2x:2edGBazvZMHltxtIv1bUS+x

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28853008022b9808fdceb25df33daff4.exe
    "C:\Users\Admin\AppData\Local\Temp\28853008022b9808fdceb25df33daff4.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"
      2⤵
        PID:2752

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs

            Filesize

            653B

            MD5

            ad04218519f73db2111444d2e096aeae

            SHA1

            ce298ed0ccd2dff5718618b18dc6696e05dc2a3e

            SHA256

            65271350ba6b4d7aa7df6c5a081c6f0cd78fc659a5bbe5c9821eba2561cb5b68

            SHA512

            8bc3eb092d87e6a873fe717e6ad937958ce9dbe164d13bb385b7865f1a3755955949db99db62a2c3e42392f16ac3297273b1d4042adb2fde5d20200db2add2f1

          • \System32\28853008022b9808fdceb25df33daff4.exe

            Filesize

            430KB

            MD5

            893f721f827bbac380f39b9ce8deead1

            SHA1

            ac8e7184da1786e203bd2e263bfc7feace29b8e6

            SHA256

            d385b51d1fad23123d6e6784d5e393e2237dc1f8a907edfac6be45c927d02e0d

            SHA512

            a77dc674acf3f36944912f97f8eb9673d281d7bf347e8025da4e68daf3785e17ff4a193fa9031faa39fa4f9965ab6abfaccb1e8fbba0791a5cd907f6a23408b8

          • memory/2176-0-0x0000000000400000-0x0000000000575000-memory.dmp

            Filesize

            1.5MB

          • memory/2176-6-0x0000000001E50000-0x0000000001E60000-memory.dmp

            Filesize

            64KB

          • memory/2176-13-0x0000000000400000-0x0000000000575000-memory.dmp

            Filesize

            1.5MB

          • memory/2176-14-0x0000000001E50000-0x0000000001E60000-memory.dmp

            Filesize

            64KB