Analysis

  • max time kernel
    22s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 21:44

General

  • Target

    13892f89e644f5b87947c4513d1eeac2.exe

  • Size

    61KB

  • MD5

    13892f89e644f5b87947c4513d1eeac2

  • SHA1

    6833e1303ffb2c81473d89853b6d353fa867c055

  • SHA256

    7b9647cc799f98bc2af9f7f1ea1e74b746277ea21da8f6a68c69bdff6971faf0

  • SHA512

    5cfff4d25fb10b8abd369546885899e2c20c3c8708bc226f52bfee3e8ad24f765d7bdc057cd9da12899da6e1c754c4f6ccb3a5a420771fba15f5da49a14adb37

  • SSDEEP

    1536:I5yMHaeuzu8bW5ffqnbVmXkWyb5j7XntdUx1ID+:QyRNnbWqakWyxXnPs1Iy

Score
8/10

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13892f89e644f5b87947c4513d1eeac2.exe
    "C:\Users\Admin\AppData\Local\Temp\13892f89e644f5b87947c4513d1eeac2.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Loads dropped DLL
    • Drops file in System32 directory
    PID:1984
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -Krmffxr
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\vawavf.dll

    Filesize

    43KB

    MD5

    e32243f5c4c0e43bb61d7c1c71c12867

    SHA1

    6f33adeec62f25b20871c1fc8685c29fb6440690

    SHA256

    27271565e6dc1166ab92bdd3583f6938358f2b22595d9a12bdd5159f6191fd48

    SHA512

    0be0fa87c83063ba107b521281a93412dd3da147fecfc9c249ca2353b5fa2298b2e5d1b2ef61b7c7b62d29ef3fb11d1e46215136a0b9194308930667ee47bf86

  • memory/1984-5-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/1984-7-0x0000000001E50000-0x0000000001EF0000-memory.dmp

    Filesize

    640KB

  • memory/1984-9-0x00000000005A0000-0x00000000005A2000-memory.dmp

    Filesize

    8KB

  • memory/1984-8-0x0000000001EF0000-0x0000000001F47000-memory.dmp

    Filesize

    348KB

  • memory/1984-6-0x0000000001DA0000-0x0000000001E4C000-memory.dmp

    Filesize

    688KB

  • memory/1984-1-0x0000000000400000-0x0000000000406200-memory.dmp

    Filesize

    24KB

  • memory/2668-16-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB

  • memory/2668-15-0x0000000000230000-0x0000000000287000-memory.dmp

    Filesize

    348KB

  • memory/2668-14-0x0000000000530000-0x00000000005D0000-memory.dmp

    Filesize

    640KB

  • memory/2668-13-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB

  • memory/2668-12-0x0000000000AE0000-0x0000000000B8C000-memory.dmp

    Filesize

    688KB

  • memory/2668-17-0x0000000010000000-0x000000001001D000-memory.dmp

    Filesize

    116KB