Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 22:54

General

  • Target

    174907cbd0f549bfddaddc4bcebf19c4.exe

  • Size

    877KB

  • MD5

    174907cbd0f549bfddaddc4bcebf19c4

  • SHA1

    0353942a8bd6af31bc0a45c3badee4768c9ff59f

  • SHA256

    41b220c00cbb815060629d153618828ee94fcf90396cb1d8512b8210fdb1b942

  • SHA512

    a7e825a6e629b46a30d1e3dedea8221d027524e75201aafbde859009e9fea39b0bf9394b3ef1470e6407500c47d3f8773a26461c34b4ddfbc2fa89922f929f8c

  • SSDEEP

    24576:xVMLKmtvPyHu7Dytct6y9pNg4W7HM+G3bOAHCS6:jiKmHyOnUp7sVC

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\174907cbd0f549bfddaddc4bcebf19c4.exe
    "C:\Users\Admin\AppData\Local\Temp\174907cbd0f549bfddaddc4bcebf19c4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Users\Admin\AppData\Local\Temp\174907cbd0f549bfddaddc4bcebf19c4.exe
      "C:\Users\Admin\AppData\Local\Temp\174907cbd0f549bfddaddc4bcebf19c4.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Users\Admin\AppData\Local\Temp\174907cbd0f549bfddaddc4bcebf19c4.exe
        "C:\Users\Admin\AppData\Local\Temp\174907cbd0f549bfddaddc4bcebf19c4.exe"
        3⤵
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\El2mnJvABq3QCpFRx7R\extramod.dll

    Filesize

    73KB

    MD5

    6bec54beaae013a45a0a490e22902001

    SHA1

    e29a03b7126450c1f87d5629a8307c42310b7189

    SHA256

    4bfa5ecc7cfdfaaf7bdad16d2cd227660115fe88781fd917c640840d487e5ae2

    SHA512

    867d16a5aadb70d8696a973d459fd8455d9085270b635b573a23451be2b8b88dd7dd5f56dd6f0dc02533d72bd4e1b3239aaa382c95b9539d093415dd0a14e1ed

  • \Users\Admin\AppData\Local\Temp\El2mnJvABq3QCpFRx7R\loading_screen.dll

    Filesize

    5KB

    MD5

    44dac7f87bdf94d553f8d2cf073d605d

    SHA1

    21bf5d714b9fcab32ba40ff7d36e48c378b67a06

    SHA256

    0e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66

    SHA512

    92c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774

  • \Users\Admin\AppData\Local\Temp\El2mnJvABq3QCpFRx7R\lua51.dll

    Filesize

    494KB

    MD5

    f0c59526f8186eadaf2171b8fd2967c1

    SHA1

    8ffbe3e03d8139b50b41931c7b3360a0eebdb5cb

    SHA256

    6e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6

    SHA512

    dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854

  • \Users\Admin\AppData\Local\Temp\El2mnJvABq3QCpFRx7R\shared_library.dll

    Filesize

    200KB

    MD5

    09d2815d25a449295029532d6fb6dd40

    SHA1

    2764b148dd2449107c8b5d917026e0f7a1de4995

    SHA256

    473d5ffc62b96076fb10be3785a519b291af8ec246318f210beb569b221ab8b5

    SHA512

    72394c1fc0c3d29a6302bfc832d6cecd1adc462dc540c97fcdfed9f7b68113177a43b0373a054f04e08ba9564bb4605bc41f9625a55dd4490010f2df678242e5

  • memory/2172-5-0x00000000001E0000-0x00000000001F6000-memory.dmp

    Filesize

    88KB

  • memory/2172-10-0x0000000000290000-0x00000000002C6000-memory.dmp

    Filesize

    216KB

  • memory/2172-13-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

    Filesize

    64KB

  • memory/2172-14-0x000000007EF90000-0x000000007EFA0000-memory.dmp

    Filesize

    64KB

  • memory/2172-20-0x000000007EF00000-0x000000007EF10000-memory.dmp

    Filesize

    64KB