Analysis

  • max time kernel
    120s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 03:34

General

  • Target

    0358a5e6cd355452c2ba03bf34647939.exe

  • Size

    314KB

  • MD5

    0358a5e6cd355452c2ba03bf34647939

  • SHA1

    5c71dbf54a9e6ba1237bea6aa04a0f3f04dd6a61

  • SHA256

    7e79a0c950f0086ebed76cde6bd4dc6853354461ae03eaf8cda53e2350226a0c

  • SHA512

    2e4ac3b428b28d466800065904f3d0ea0e4eb3f390590d5d1ec44e6544b07592fab71cd93ea2e4639161afa273faf95e4ba4161af0627797e9c3277b309b41c4

  • SSDEEP

    6144:hTOGiA9k6j6AvSHlFYlfNad5+LKh086tMhadfWx65vP59c1:N1zvSFMNBKh0xtI+f1t59W

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0358a5e6cd355452c2ba03bf34647939.exe
    "C:\Users\Admin\AppData\Local\Temp\0358a5e6cd355452c2ba03bf34647939.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Users\Admin\AppData\Local\Temp\Qr0i.exe
      "C:\Users\Admin\AppData\Local\Temp\Qr0i.exe"
      2⤵
      • Executes dropped EXE
      PID:2656
    • C:\Users\Admin\AppData\Local\Temp\En9e8.exe
      "C:\Users\Admin\AppData\Local\Temp\En9e8.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Users\Admin\AppData\Local\Temp\En9e8.exe
        C:\Users\Admin\AppData\Local\Temp\En9e8.exe
        3⤵
          PID:2236
        • C:\Users\Admin\AppData\Local\Temp\En9e8.exe
          C:\Users\Admin\AppData\Local\Temp\En9e8.exe
          3⤵
            PID:1440
          • C:\Users\Admin\AppData\Local\Temp\En9e8.exe
            C:\Users\Admin\AppData\Local\Temp\En9e8.exe
            3⤵
              PID:2100

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\En9e8.exe

                Filesize

                190KB

                MD5

                48ebe403c88fa3670b37f919eb5e6215

                SHA1

                a031536ab7b4dd503ac2a1d1b256539f38d18d24

                SHA256

                30c9d492b83610e093e7ec3558faec1a096ad969bd7c324ae3c75293c3a6f098

                SHA512

                05c9d184f321975ec8a5ab36cfe432e9dd3494ca32820b33c17d9c24a43504858534d1e6af9738de3d51a5d8a634f6d194b50af0ecc6a84ca8077b3cad71d53b

              • C:\Users\Admin\AppData\Local\Temp\Qr0i.exe

                Filesize

                72KB

                MD5

                31db3a37716e014ece3fc35de48d2565

                SHA1

                f625c546ded9ac0e444638cb4a3e03cb8c7bdbb3

                SHA256

                6ec95cd32b0d4cbbeb225981154e25ceaebed5a8a547af02fc04088b2a3bb40d

                SHA512

                0bd6f0498b82d6ce6b7f5126aba3b2802cb590fded7c0e11068d45e605fc9f294e4ade864bc79af88b7a0b9145ec0735782cf80b1ab34d7277b8a3e2ed334078

              • memory/2020-0-0x000007FEF5DD0000-0x000007FEF676D000-memory.dmp

                Filesize

                9.6MB

              • memory/2020-1-0x0000000001F70000-0x0000000001FF0000-memory.dmp

                Filesize

                512KB

              • memory/2020-2-0x000007FEF5DD0000-0x000007FEF676D000-memory.dmp

                Filesize

                9.6MB

              • memory/2020-3-0x0000000001F70000-0x0000000001FF0000-memory.dmp

                Filesize

                512KB

              • memory/2020-15-0x000007FEF5DD0000-0x000007FEF676D000-memory.dmp

                Filesize

                9.6MB

              • memory/2352-20-0x0000000001F90000-0x0000000002010000-memory.dmp

                Filesize

                512KB

              • memory/2352-75-0x0000000001F90000-0x0000000002010000-memory.dmp

                Filesize

                512KB

              • memory/2352-17-0x0000000001F90000-0x0000000002010000-memory.dmp

                Filesize

                512KB

              • memory/2352-19-0x0000000001F90000-0x0000000002010000-memory.dmp

                Filesize

                512KB

              • memory/2352-21-0x0000000001F90000-0x0000000002010000-memory.dmp

                Filesize

                512KB

              • memory/2352-70-0x000007FEF5DD0000-0x000007FEF676D000-memory.dmp

                Filesize

                9.6MB

              • memory/2352-71-0x0000000001F90000-0x0000000002010000-memory.dmp

                Filesize

                512KB

              • memory/2352-18-0x000007FEF5DD0000-0x000007FEF676D000-memory.dmp

                Filesize

                9.6MB

              • memory/2352-76-0x000000001BB60000-0x000000001BB72000-memory.dmp

                Filesize

                72KB

              • memory/2352-77-0x0000000001F90000-0x0000000002010000-memory.dmp

                Filesize

                512KB

              • memory/2352-16-0x000007FEF5DD0000-0x000007FEF676D000-memory.dmp

                Filesize

                9.6MB

              • memory/2352-85-0x000000001FB80000-0x0000000020326000-memory.dmp

                Filesize

                7.6MB

              • memory/2352-120-0x0000000001F90000-0x0000000002010000-memory.dmp

                Filesize

                512KB

              • memory/2352-121-0x0000000001F90000-0x0000000002010000-memory.dmp

                Filesize

                512KB