Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 21:59

General

  • Target

    14300d9399d7c67a3a7bfbf3758f03ea.exe

  • Size

    320KB

  • MD5

    14300d9399d7c67a3a7bfbf3758f03ea

  • SHA1

    99a2310a77862e66e7f5d8dde0a5ee9d26054c0f

  • SHA256

    17c2e3336403b39a18a887a11a6a359e26695ff9b741563e4cee85dd6c4d4e8a

  • SHA512

    2531e8ed82f3096aaaf87f8eeef0451954a7a6dd109b7d8e30e705d95d0f811318c8520c9617eff77f3dbbf7d17abe472eb92097ff896389a191d658451eccd3

  • SSDEEP

    6144:ChIcFeEK/fObT/bGibErxUyF+fmYYdPMAaiSnD:ChIcFeEK/fObT/bGiPo+eYYt/LSnD

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14300d9399d7c67a3a7bfbf3758f03ea.exe
    "C:\Users\Admin\AppData\Local\Temp\14300d9399d7c67a3a7bfbf3758f03ea.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Users\Admin\jaaci.exe
      "C:\Users\Admin\jaaci.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jaaci.exe

    Filesize

    275KB

    MD5

    76dc6d9f07fe6786911067312b521c8c

    SHA1

    c0886a74e51a2516b5fc7b8bdbac5b3ec794cb89

    SHA256

    129ed24afebb6a62ec45184e53993656c979d9bbac3250f88602a8c5aed58ed2

    SHA512

    e6c4b25537977946396aa48a49c15da9cc1fc202660d132e290971646212c78783460202641c3971ee870e11328287e0ab06167485d461975409dd628b59e8a1

  • \Users\Admin\jaaci.exe

    Filesize

    320KB

    MD5

    ff68b54f91c441383c8edc206d34f968

    SHA1

    e40af0ea5444e8bd44914ad16cf6db208493ddfe

    SHA256

    d01927756732b5859dab8c4def1444148ca24699497295ddf210b972d1992705

    SHA512

    19f06a8edc3a33714543a78274fd78940731178ab80c101ef3b4be385e4c9c7ceec7b70d195722df206c2a3ac6a9fca148288f0bffec913d8ef4e1708d21f1ad