Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 04:36

General

  • Target

    0583f2193494cf535830cd6637c9b9ba.exe

  • Size

    324KB

  • MD5

    0583f2193494cf535830cd6637c9b9ba

  • SHA1

    7b2f007ad2eb2b607ae29d549068a88a2e5b0a0a

  • SHA256

    e53b9c2da6150a262bfd63af2876d30dd6e035c4f6b98609b2ac663d90594951

  • SHA512

    26ae2f2c69035cdc22aa48fadaa7a3f102d4e6c1f2911a9480ffcffb6cab5d90e26f1a364b547c38aeb8a9126c1c4f55f8689fa4954c757d2fa4eeb9eeeb66d3

  • SSDEEP

    1536:YOJVn4JLlfLJ0UYFqeXx5774wN5eCD8SlNDSSvHFRiCCVGCWPaeSe+eooOoaoCom:7V4JLlfLIl774wN5eI4V

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0583f2193494cf535830cd6637c9b9ba.exe
    "C:\Users\Admin\AppData\Local\Temp\0583f2193494cf535830cd6637c9b9ba.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer start page
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\system32\wscript.exe" /nologo C:\WINDOWS\3323.vbs
      2⤵
        PID:2132
      • C:\Users\Admin\AppData\Local\Temp\Del4135.tmp
        C:\Users\Admin\AppData\Local\Temp\Del4135.tmp 300 "C:\Users\Admin\AppData\Local\Temp\0583f2193494cf535830cd6637c9b9ba.exe"
        2⤵
        • Deletes itself
        • Executes dropped EXE
        • Drops file in Windows directory
        • Modifies Internet Explorer start page
        • Suspicious use of WriteProcessMemory
        PID:1900
        • C:\Windows\SysWOW64\wscript.exe
          "C:\Windows\system32\wscript.exe" /nologo C:\WINDOWS\3323.vbs
          3⤵
            PID:1952

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\Del4135.tmp

              Filesize

              324KB

              MD5

              0583f2193494cf535830cd6637c9b9ba

              SHA1

              7b2f007ad2eb2b607ae29d549068a88a2e5b0a0a

              SHA256

              e53b9c2da6150a262bfd63af2876d30dd6e035c4f6b98609b2ac663d90594951

              SHA512

              26ae2f2c69035cdc22aa48fadaa7a3f102d4e6c1f2911a9480ffcffb6cab5d90e26f1a364b547c38aeb8a9126c1c4f55f8689fa4954c757d2fa4eeb9eeeb66d3

            • C:\WINDOWS\3323.vbs

              Filesize

              266KB

              MD5

              1861b0d15a96f0eab78821ef09f11398

              SHA1

              9931aec4e49a4075ce680ae5e69069f506f4383c

              SHA256

              0981eb96faa65fe1ea7afde1d97184d67970c06ed442919a1173b48e91ad5d54

              SHA512

              2b49cf513a546e43040fe63f99adf1d4cd49510a65c04d68122e398c9e1687fd5b29094261cc5265d92b740e8ee9fad46994a97d32ce86222abc7669afd97415