Analysis

  • max time kernel
    142s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 12:41

General

  • Target

    1f359efe2bcfb67234b7c5dc689fbdb6.exe

  • Size

    312KB

  • MD5

    1f359efe2bcfb67234b7c5dc689fbdb6

  • SHA1

    56471afe54fd3209d3f1f5d4ce0457ae2219aaac

  • SHA256

    2308f8e8efc684070263a99ab797b0ff02342d528b5ddc320b63260059937e98

  • SHA512

    089bb561e072c6d5a2ba292a2c7f0a99d6bb20173231d9c8ddf4935b18a153fbc3183591a45a95311ac6fc121b3747796d464fa9ac7fd64be2ff87111ad337af

  • SSDEEP

    3072:Bwbqks+CRoRwGg00jN/wfLEAy8zsH1j05sYUncjIdqIdpx1xmLcgcO9U004NOFVf:Bweks+CRE0mfLS8zW1Osdnp1PuJ93ON

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f359efe2bcfb67234b7c5dc689fbdb6.exe
    "C:\Users\Admin\AppData\Local\Temp\1f359efe2bcfb67234b7c5dc689fbdb6.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1940

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YV6H14B0\px[2].js

          Filesize

          346B

          MD5

          f84f931c0dd37448e03f0dabf4e4ca9f

          SHA1

          9c2c50edcf576453ccc07bf65668bd23c76e8663

          SHA256

          5c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584

          SHA512

          afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c

        • \Users\Admin\AppData\Local\Temp\bhs6097.tmp

          Filesize

          242KB

          MD5

          46abad63ed5a1a264515f158a08dd410

          SHA1

          96bf993cbf8245c2adcdf305f6f8b2e2579f5707

          SHA256

          7df243e7fef0e6894b7b5ca9ed12598c61ad92706d54b795c871ff32559199e7

          SHA512

          17d6d52b04ee0d29aa18ec7eacf468cf62414479165ce11bef23e1446780611ff41fb1f2b596f34e67c90e691d3ddece87f9acf26c4569b28df3d8dbdaa58243

        • memory/1940-0-0x0000000074300000-0x00000000749EE000-memory.dmp

          Filesize

          6.9MB

        • memory/1940-3-0x0000000000440000-0x0000000000482000-memory.dmp

          Filesize

          264KB

        • memory/1940-4-0x00000000047E0000-0x0000000004820000-memory.dmp

          Filesize

          256KB

        • memory/1940-5-0x00000000047E0000-0x0000000004820000-memory.dmp

          Filesize

          256KB

        • memory/1940-6-0x00000000047E0000-0x0000000004820000-memory.dmp

          Filesize

          256KB

        • memory/1940-9-0x000000000A500000-0x000000000ACA6000-memory.dmp

          Filesize

          7.6MB

        • memory/1940-10-0x0000000074300000-0x00000000749EE000-memory.dmp

          Filesize

          6.9MB

        • memory/1940-11-0x00000000047E0000-0x0000000004820000-memory.dmp

          Filesize

          256KB

        • memory/1940-32-0x00000000047E0000-0x0000000004820000-memory.dmp

          Filesize

          256KB

        • memory/1940-33-0x00000000047E0000-0x0000000004820000-memory.dmp

          Filesize

          256KB