Analysis

  • max time kernel
    147s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 05:36

General

  • Target

    087a8101d38fa364ddf1b2c248494788.exe

  • Size

    696KB

  • MD5

    087a8101d38fa364ddf1b2c248494788

  • SHA1

    479e880862dd54d7d45145208dba3c2a494fab52

  • SHA256

    bd2234a31a15f31b0afd9ed6db59767482c4236db557e58f6f7fb2f92b88fb8c

  • SHA512

    2d9249405bf4f5e69f3610e5a109450cc56c8fe75e5aad919393ff1d96ef4571bfd60d9f16151738eb1b0f60b1d14f768407df047d812336f2076ea2f85bccf2

  • SSDEEP

    12288:nwYrzpGLVyD/E23EDF5l8gVCtfad1Fi9OgJPFj8HwuRrM8b+6QSTccnxXo:wAzpWEf0DFEgEtSd1I9zJtj8HwutMhi8

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies WinLogon 2 TTPs 7 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\087a8101d38fa364ddf1b2c248494788.exe
    "C:\Users\Admin\AppData\Local\Temp\087a8101d38fa364ddf1b2c248494788.exe"
    1⤵
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Modifies WinLogon
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4580
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3440

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\tdev.dll

            Filesize

            93KB

            MD5

            d8cf6b0590d7fcb85195885767ecfd58

            SHA1

            071799f0ddcdabe670f00516c47d511e8ae2a46d

            SHA256

            26665f47c302d145b717ce194867299b6454aa699fc737639eaf56d57f1a9272

            SHA512

            5ef690f67dab3fd9ab8bace6063094ed1666dfb2445ad33570a3f70a9d0cd7cadd8ab9ec6dd0fcc0e25f974540a587b13d707c62db0d6a274d952ca9dc21eb69

          • C:\Windows\SysWOW64\tdev.dll

            Filesize

            91KB

            MD5

            1c6259db282ce7d80777aff57331f746

            SHA1

            f74a0a52c7d944f45f56b224b1caca64b98f1b8d

            SHA256

            600bd1d3f56444afe93ca67fa82b5e20db77d42e3c461f6da15922253b368c19

            SHA512

            08be444c56baec147ac122f8659c6140ef012c865e56b66a63d524ddb9a3536bc57e007185ae84a3a6bc97c3c11c83fbb4a7d994146076578b5da48fe3ca6934

          • C:\Windows\SysWOW64\tdev.dll

            Filesize

            92KB

            MD5

            e9674516aebeca24c5c366af96e10d05

            SHA1

            de9b775edcb5ddf5e7cb8691ef002547a1a48a29

            SHA256

            af6d7faa1d9f9a0a5ad16628869322416972afdd7c9563405eb990285b49acc0

            SHA512

            487cc1d79ed663e3fd89972ba944532f9dfb5a3bc80eca2293e9274feba8b847828fcd1e667116a2ed2544bddf92c3672338fef78a12928248d55cfb8897e71f

          • memory/4580-0-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB

          • memory/4580-12-0x00000000022E0000-0x000000000238D000-memory.dmp

            Filesize

            692KB

          • memory/4580-15-0x00000000022E0000-0x000000000238D000-memory.dmp

            Filesize

            692KB

          • memory/4580-14-0x0000000000400000-0x00000000004B0000-memory.dmp

            Filesize

            704KB