Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 21:28

General

  • Target

    12fa989a3e318c4decb1a6ab26cda01a.exe

  • Size

    333KB

  • MD5

    12fa989a3e318c4decb1a6ab26cda01a

  • SHA1

    182c5d9d48a68890d800ed75fdad3af00e9c123d

  • SHA256

    d004666c5176e398e42966e44c4aea32cbad97d84d35baaff06b5a98f8bcfc39

  • SHA512

    c4d63abde5fc477c2e29bfa468583a2d86afa22583a1c36678fcd8a19a45421be90d4bc34329cf50feca030c27d8ad80e03eaa2374cdd3d4db8af9e2556a04e4

  • SSDEEP

    6144:o1jFiZvXP9NMR6LVGBpJ1AyvrNm/+WxFBeRCrBA5Hxmv6wnRDx5Gjz7jgoZ3g:ohFI9o6LMX1AGNgeRCrC5Hx70Gj/Eyg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Program crash 1 IoCs
  • Drops file in System32 directory 18 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12fa989a3e318c4decb1a6ab26cda01a.exe
    "C:\Users\Admin\AppData\Local\Temp\12fa989a3e318c4decb1a6ab26cda01a.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\SSSSSS.BAT
      2⤵
        PID:4324
    • C:\Program Files\Outlook Express\ghost.exe
      "C:\Program Files\Outlook Express\ghost.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1824
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" about:blank
        2⤵
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4892
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4892 CREDAT:17410 /prefetch:2
          3⤵
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          PID:532
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 1232
            4⤵
            • Program crash
            PID:4064
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 532 -ip 532
      1⤵
        PID:2108

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Outlook Express\ghost.DLL

        Filesize

        296KB

        MD5

        e08f414ba4240f9c767b571dcada7d89

        SHA1

        5b9d1f37d142c8aeca009fd95b6f94af4f1af236

        SHA256

        a159ecd511a6250a36d864fbc54acc2ad68cf0dfdaf47ee33a8206aebfa6e349

        SHA512

        1d302d3c476fbb2c622ae2f51f3e19e4f296728e929e63df85dfd247758a046cf1fc3a25cd83933818f49d9f64772d5616cd6e951109b4c631307ebb6e500bb8

      • C:\Program Files\Outlook Express\ghost.exe

        Filesize

        333KB

        MD5

        12fa989a3e318c4decb1a6ab26cda01a

        SHA1

        182c5d9d48a68890d800ed75fdad3af00e9c123d

        SHA256

        d004666c5176e398e42966e44c4aea32cbad97d84d35baaff06b5a98f8bcfc39

        SHA512

        c4d63abde5fc477c2e29bfa468583a2d86afa22583a1c36678fcd8a19a45421be90d4bc34329cf50feca030c27d8ad80e03eaa2374cdd3d4db8af9e2556a04e4

      • C:\Windows\SSSSSS.BAT

        Filesize

        190B

        MD5

        1545766dbf4f5308bdab0eade67e8472

        SHA1

        31d2b9b8137ab1092f6c53a9a2dfb5ca54b3dc53

        SHA256

        c8fd6b7bfefd5623feeb628b57987bd3e008486a2a949b58442a479f71f1c4f7

        SHA512

        9e3ca11fe0f7fd1aac0ff948ebfe4b1b93e9c428e25494fc2c765fdee360cab4ef0d0361a1c3cb64565de7fd2e4b08d5dffbcfdda493e5517bd9ad619097b736

      • memory/1296-0-0x0000000000400000-0x00000000004BB09B-memory.dmp

        Filesize

        748KB

      • memory/1296-9-0x0000000000400000-0x00000000004BB09B-memory.dmp

        Filesize

        748KB

      • memory/1824-25-0x0000000000400000-0x00000000004BB09B-memory.dmp

        Filesize

        748KB

      • memory/1824-26-0x0000000013140000-0x000000001323F000-memory.dmp

        Filesize

        1020KB

      • memory/1824-27-0x0000000013140000-0x000000001323F000-memory.dmp

        Filesize

        1020KB

      • memory/1824-31-0x0000000000400000-0x00000000004BB09B-memory.dmp

        Filesize

        748KB

      • memory/1824-32-0x0000000013140000-0x000000001323F000-memory.dmp

        Filesize

        1020KB

      • memory/1824-34-0x0000000013140000-0x000000001323F000-memory.dmp

        Filesize

        1020KB