Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 21:33

General

  • Target

    1329231c9313dfd0ed04086b277453ad.exe

  • Size

    88KB

  • MD5

    1329231c9313dfd0ed04086b277453ad

  • SHA1

    14beefe91c8174969b941ee12dd29cbeda03a4cb

  • SHA256

    98ddea0288e82d715f9e9b92b7a8a2393396c80a3738216090c7bec5bd662dd4

  • SHA512

    8f11ea85444844a1ebcabd08b9a8022e0b37555c96dd43922281afdb79db72f6376d7fbdfd996b8ba3fd4616f2bdaad5d39275ed611b59782a5e6b7900cc916b

  • SSDEEP

    1536:IjybbSpy8tXG06YpqdXTsYJ/F+FBFIFGFYF7DUZxTZbma:tSs0G0mZyv

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1329231c9313dfd0ed04086b277453ad.exe
    "C:\Users\Admin\AppData\Local\Temp\1329231c9313dfd0ed04086b277453ad.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\mirir.exe
      "C:\Users\Admin\mirir.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\mirir.exe

    Filesize

    88KB

    MD5

    c0b6d3f06ad89466fb197ccebdea1c15

    SHA1

    9ad5b97c93e2e63492c0c3a92da45935215098a4

    SHA256

    e9ea1d74f5d93d27924f5ee52d7d0004b31a0880e5abc3caeb527729c74b2377

    SHA512

    c72533cdb2f480b46b9be736d8f6b75402c9d7dcc87ce5e693bd5207fbb6489f6296dc52858efa359bf4b12cf6c85441895b81d41cdc770a63de49e26430f7df