Analysis

  • max time kernel
    183s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 23:32

General

  • Target

    4369c6f7756bf6337b4488c3ff405817.exe

  • Size

    232KB

  • MD5

    4369c6f7756bf6337b4488c3ff405817

  • SHA1

    255dcffacc5ea214254be1e8b20b01c38f70fa67

  • SHA256

    35f0fc1a75dff7b1c8a3c8e22fd50c449f8ce9585a1d7c4114db140480db59a1

  • SHA512

    a24aa2c0ffa048e112d3f33a2cc93f23ffc7431d859f51125283a36a1d800430ba326d2380f6e73a5bb52a973d5e324a5c71a5db1d7ab34bca17becbbb44fab9

  • SSDEEP

    3072:prurB6QdzaxMGwBcQlUt0gGFItJZLVagt7q67DXP59wE2bpfV:prurB6QdzeMGwBRw9GbmzEn/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4369c6f7756bf6337b4488c3ff405817.exe
    "C:\Users\Admin\AppData\Local\Temp\4369c6f7756bf6337b4488c3ff405817.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\mooqu.exe
      "C:\Users\Admin\mooqu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2708

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\mooqu.exe

          Filesize

          109KB

          MD5

          13ff833a3eeab31a2f5c336d88d420f6

          SHA1

          132ea5b783a7c68741e6f79ebb26c3b83d44799f

          SHA256

          a4518adc5d69d24f2775546382192dde0b45b270b53c661864b421e446d99683

          SHA512

          976f2aa1d09cd8f3f7d87a074f167ebf59fd7337d9e16885a14aaa6deb90b5a2c106de4910eb7101dc02d1b50e6f5a2a4b91d891c4a28dda73198362b23bf2e6

        • C:\Users\Admin\mooqu.exe

          Filesize

          35KB

          MD5

          d5a50d68429be012e50a641269463f94

          SHA1

          4f2f9eafd5c632420bd0d77dd2561ad5d2634b80

          SHA256

          13053ee0d96364ca92ed580e248f48fea321418c4b01acc7ea8bbe2a6bf615c8

          SHA512

          9687c572606bdcf00695e9dd2610b5fe3687c8661fd2b5a993fb208ed1968140d24ee3798656c259fac9f0a06c2da3169bdafdb36056bae479d113d4f0c4a250

        • C:\Users\Admin\mooqu.exe

          Filesize

          26KB

          MD5

          d3918a8257088ee15ce04d5c9614a258

          SHA1

          346e909a7cdb9d976ab1c351044689a18c99c575

          SHA256

          7c8031d99bfd85414dd6e186dd6b10d952e9b85de2bcf69685c9af0518a1fb60

          SHA512

          c39fdf79f914e7952b0c514f4244b3df68c3b4ad38a19e60d41d20e4caf7d4de3fa50e5087fccd9d89b58b3a0ce600c8d802da2d93cccbe7e9a5134e9d8f45d7

        • \Users\Admin\mooqu.exe

          Filesize

          1KB

          MD5

          d8fa5715a7c51ffb3fc1a45bac64ffc8

          SHA1

          62236b9fea55a8b6a5dbc8d2398126a27915e547

          SHA256

          ac9732918611db14bc75871d5056f2581169049fe72abc7adc98734fd77154a7

          SHA512

          8de0dc634881cadb8574504996ec94f3b668b5ec638c3b8c2f7926e0497a7942e893c2626b4088ac8aa8d4b5ccbde7892d83de0231c8999457b8b573bd84903d

        • \Users\Admin\mooqu.exe

          Filesize

          42KB

          MD5

          dbbfd0a63571338ed5d0d308edda5061

          SHA1

          bfa6ca5407b7375e6c26c81ea55b9ae61e91af6f

          SHA256

          375c83d915d2fcee9be0747a0cb1ce404db1e51256015234a555afd14c741941

          SHA512

          f9cf2308216a22e671179d29eb74ceb839f20b117b094742304dbb3742a17a0577510b7b531701717ce66e8b4eb0f8dfe6c9b72915898ef1a9be59615098143b