Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 22:32

General

  • Target

    16019f17e7ea965f721a9c7e2fa50af8.exe

  • Size

    312KB

  • MD5

    16019f17e7ea965f721a9c7e2fa50af8

  • SHA1

    0e708a810cacf517ad5792332deb13bcdaf7b38e

  • SHA256

    054e6decfbdcbf37e7fdd2f821d9e501b6c3807218c22bebf55308fd2e47d97c

  • SHA512

    079937b9ddfc272db6b01919749357ddb304ac0fd8b2a40ba0b484372c31955f57a058b6f7b8a41d2f9db8558294644d4ce378d4c55bec9247dc9a4ad112eb68

  • SSDEEP

    6144:8weks+CRE0mfLS8zW1Osdnp1PuJ93ZLYT:5eknCO0mzS8UnpaM

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16019f17e7ea965f721a9c7e2fa50af8.exe
    "C:\Users\Admin\AppData\Local\Temp\16019f17e7ea965f721a9c7e2fa50af8.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\bhs897B.tmp

    Filesize

    242KB

    MD5

    46abad63ed5a1a264515f158a08dd410

    SHA1

    96bf993cbf8245c2adcdf305f6f8b2e2579f5707

    SHA256

    7df243e7fef0e6894b7b5ca9ed12598c61ad92706d54b795c871ff32559199e7

    SHA512

    17d6d52b04ee0d29aa18ec7eacf468cf62414479165ce11bef23e1446780611ff41fb1f2b596f34e67c90e691d3ddece87f9acf26c4569b28df3d8dbdaa58243

  • memory/2660-2-0x0000000000330000-0x0000000000372000-memory.dmp

    Filesize

    264KB

  • memory/2660-3-0x0000000074570000-0x0000000074C5E000-memory.dmp

    Filesize

    6.9MB

  • memory/2660-4-0x00000000047D0000-0x0000000004810000-memory.dmp

    Filesize

    256KB

  • memory/2660-5-0x00000000047D0000-0x0000000004810000-memory.dmp

    Filesize

    256KB

  • memory/2660-6-0x00000000047D0000-0x0000000004810000-memory.dmp

    Filesize

    256KB

  • memory/2660-7-0x00000000047D0000-0x0000000004810000-memory.dmp

    Filesize

    256KB

  • memory/2660-10-0x000000000A380000-0x000000000AB26000-memory.dmp

    Filesize

    7.6MB

  • memory/2660-18-0x0000000074570000-0x0000000074C5E000-memory.dmp

    Filesize

    6.9MB

  • memory/2660-19-0x00000000047D0000-0x0000000004810000-memory.dmp

    Filesize

    256KB

  • memory/2660-21-0x0000000074570000-0x0000000074C5E000-memory.dmp

    Filesize

    6.9MB

  • memory/2660-22-0x00000000047D0000-0x0000000004810000-memory.dmp

    Filesize

    256KB