Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 05:04

General

  • Target

    06ad94588dac41d679ec7c9288b93c66.exe

  • Size

    142KB

  • MD5

    06ad94588dac41d679ec7c9288b93c66

  • SHA1

    1de394feb3fed07c8c214043b87d6974d85fe705

  • SHA256

    7439b3f417238ea4201cb0ec1b454fd56dccdf712a011a6471e183d81eb3b07f

  • SHA512

    3f99d76217a5dd0a2f5d5ec5e84db5060d402faae2708a8fee7069d400018a9f5fa4e1a94d8006841d16a66a064ac51fafba8025080859babd1dbc69928fd94b

  • SSDEEP

    3072:inOn7t7XpdpCCTg/sxFgJPeqgKJ+BCQChb9fE/IhEUmPdWcDoIoM:iKpdcCrTCgKN59fEQ3WWIv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06ad94588dac41d679ec7c9288b93c66.exe
    "C:\Users\Admin\AppData\Local\Temp\06ad94588dac41d679ec7c9288b93c66.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\nso9F2.tmp\downloadmr.exe
      C:\Users\Admin\AppData\Local\Temp\nso9F2.tmp\downloadmr.exe /u4dc2dbed-8094-4277-ae39-3b105bc06ebe /e2269091
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nso9F2.tmp\System.dll

    Filesize

    21KB

    MD5

    5ebc73650256e9c8ddbcda231db829a1

    SHA1

    988d4535e18754ab2a6248abae96c5697d7dbcd5

    SHA256

    1eaa543842df7795404184e8892a1654b0773dbc9bd8b54c7fdb9e68f4355493

    SHA512

    b21266e76fc7263af982a1336a766e47ccf348ed56b305dbb09f03574c9b2a7309f12200e80d86f9a251381be6e87a41206447f11c51899cb31fba10da1d5270

  • C:\Users\Admin\AppData\Local\Temp\nso9F2.tmp\downloadmr.exe

    Filesize

    122KB

    MD5

    da254a8488b60244654e1cf4d6796cf8

    SHA1

    23d06f4589786652a3a226b5012a5520a3d03452

    SHA256

    6d3b82a7ad74a1e88ae4d0f9176082130f1558fb3ff42a8b45ca8b80445efc2d

    SHA512

    d311f90ad65441f6c7ae55220c2c3f117aa7601d083e6847e1b58b96c3c332d68a25d445310818396dc88678fb9ec5356f35a04a392c3d23746a2231e14b0a2e

  • C:\Users\Admin\AppData\Local\Temp\nso9F2.tmp\downloadmr.exe

    Filesize

    1KB

    MD5

    02c8cbea98a927a222ed976780070b46

    SHA1

    b818811d1f2f9716002864bbfde2c1af577ea9bd

    SHA256

    34671fe1060883f65a199ab36ee171085fa914fe16c966a394bbe77d57e34b48

    SHA512

    4206ce3bf4996ebe128a101bab69877b3529fe38e3a20155f6642ba73beab2d40fa94fe84b591c8a748b62c3fc0378734e3d43adf9dc5ab051c5226fb48a1849

  • memory/2112-27-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2284-18-0x00000000741E0000-0x000000007478B000-memory.dmp

    Filesize

    5.7MB

  • memory/2284-20-0x0000000000100000-0x0000000000140000-memory.dmp

    Filesize

    256KB

  • memory/2284-19-0x00000000741E0000-0x000000007478B000-memory.dmp

    Filesize

    5.7MB

  • memory/2284-21-0x0000000000100000-0x0000000000140000-memory.dmp

    Filesize

    256KB

  • memory/2284-22-0x0000000005B50000-0x0000000005C50000-memory.dmp

    Filesize

    1024KB

  • memory/2284-23-0x00000000741E0000-0x000000007478B000-memory.dmp

    Filesize

    5.7MB