Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 23:13

General

  • Target

    188cd2171b27bda87f2451747d038eac.exe

  • Size

    21KB

  • MD5

    188cd2171b27bda87f2451747d038eac

  • SHA1

    06a9108a9f3c9cf5f1cce17388686fd2f97410de

  • SHA256

    9d76dd3d120b554def124db5edf875230f6609d71475765f1255822bdfc1f8f4

  • SHA512

    3fff32535c0678557ca39ef9ec37b9bca917aecb379a1cde3002f78211040ce7e4aadd1de7c80ca5c1859d238646a57543c18f1ab2946732f69e9c1499849773

  • SSDEEP

    384:+h/3opT7gogrRa07KSPZM95FhJ22ywEyrAMedMBQRTmFKdAdkQD+Ft9row:04pnvg9a0HMF+wNedMBQglept9v

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\188cd2171b27bda87f2451747d038eac.exe
    "C:\Users\Admin\AppData\Local\Temp\188cd2171b27bda87f2451747d038eac.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\188CD2~1.EXE >> NUL
      2⤵
      • Deletes itself
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\E0D39066.dll

    Filesize

    11KB

    MD5

    cfb8e135d06f33b9846b8640d7825ce9

    SHA1

    17c4cb59dc9ecc96a633c0df0831ae566585ed76

    SHA256

    608db9c488f642bfe4803b47f742d08bef0a2c4e355ca0b91d645ab9ce06965d

    SHA512

    9c7daecfa85f2a48a14405d7b00c4feb23cc7632160ce1f535174ebc044b1b7ecc8b9023fc7e69ca2ed7aa381522e52b339569292aa27af80fce1928e7128fbc

  • memory/1368-1-0x00000000005E0000-0x00000000005E1000-memory.dmp

    Filesize

    4KB

  • memory/1368-8-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB

  • memory/1368-9-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB