Analysis

  • max time kernel
    200s
  • max time network
    242s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 11:53

General

  • Target

    1c3fef3f51c0f19e488b41f9bc112d69.exe

  • Size

    391KB

  • MD5

    1c3fef3f51c0f19e488b41f9bc112d69

  • SHA1

    393a400cfb382ef65a8eaf65cb627f06e4982456

  • SHA256

    228247219d6b7a7fa103ddcb3e04f63b388fc0c8a6dbcb30cd49f62b77e21e0d

  • SHA512

    81afb8206c9af992164836f5742a05a5c5d692d45dafe424675bb20bac96d997bd92510319365b350f87eb71d46fce649fd12dadcd9e3d1cc8d229bd4237039f

  • SSDEEP

    6144:0Gyw99vtxI7XzzQoRXdla8To8maHHko/9FsHbtR28mI7r:w4vt6bXQoRXdlHToQnl9OH2NI7r

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c3fef3f51c0f19e488b41f9bc112d69.exe
    "C:\Users\Admin\AppData\Local\Temp\1c3fef3f51c0f19e488b41f9bc112d69.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2548
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x4f8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1YVWL6AI\px[1].js

    Filesize

    346B

    MD5

    f84f931c0dd37448e03f0dabf4e4ca9f

    SHA1

    9c2c50edcf576453ccc07bf65668bd23c76e8663

    SHA256

    5c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584

    SHA512

    afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c

  • \Users\Admin\AppData\Local\Temp\gfd901F.tmp

    Filesize

    264KB

    MD5

    b795e14dcb8b6f9f79c459c033cc5218

    SHA1

    337d7e4d738dcfc54bda89c76857d834b4fc937a

    SHA256

    6f952d44fef31c1ea27ec812a6102dda47529a9c14589ca36e6d27f67565d905

    SHA512

    d93b1d3b5351f97b0af91589378f9b4733efb13510531cdd58936f8bd0bdc4d8ad9a613dea3a023d77e516dca40fe87e729346fd7825e0e30ab71a8dcf665e4f

  • memory/2548-0-0x0000000074E00000-0x00000000754EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2548-3-0x0000000000500000-0x0000000000546000-memory.dmp

    Filesize

    280KB

  • memory/2548-4-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB

  • memory/2548-5-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB

  • memory/2548-6-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB

  • memory/2548-7-0x0000000074E00000-0x00000000754EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2548-8-0x0000000004B80000-0x0000000004BC0000-memory.dmp

    Filesize

    256KB

  • memory/2548-14-0x000000000B450000-0x000000000BBF6000-memory.dmp

    Filesize

    7.6MB