Analysis

  • max time kernel
    58s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 03:58

General

  • Target

    043d8def8d9c9d603b5a6320b4e8a9e6.exe

  • Size

    292KB

  • MD5

    043d8def8d9c9d603b5a6320b4e8a9e6

  • SHA1

    69c0b167a82e148f27ec35208230232204581d32

  • SHA256

    19cac766fac463a947302ab28b35cbd479b4d293340833b23fce34faf048b45d

  • SHA512

    654e9e2c442d058b0716388c6426079d1790824239abb125a1c806717a39b2007ed999906d19daacc785943e2eda5bbc71bb5355c6747ffe29bb17b69cf3f252

  • SSDEEP

    6144:m6f0iLlxjqNeVilscsU3ESMCjtpUABR6YLzSv79VxUutl:fXLlx2kViuUPMCjtpUABR6YLzo7RUy

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 44 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\043d8def8d9c9d603b5a6320b4e8a9e6.exe
    "C:\Users\Admin\AppData\Local\Temp\043d8def8d9c9d603b5a6320b4e8a9e6.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\dgjuij.exe
      "C:\Users\Admin\dgjuij.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2932

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\dgjuij.exe

          Filesize

          292KB

          MD5

          031a15f6d9aa2dfc86addf8a06eaa4fa

          SHA1

          87d411f533ddb4b6445e32ab27848b1dd413d6e9

          SHA256

          b744a982be352f2c0093aff54180cb53b8717b4f5244630dfdaf1a893135506f

          SHA512

          9f3c81770501bdcdacede217aefb9175b89dac76c64c52f0c444a43a46b0d39bf32eb0a181017686504104d378c2c238927b00ce21ad631ee7adb77468ba2872