Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 13:06

General

  • Target

    20799bc55b8c1ce917f3ccf363b6e5dc.exe

  • Size

    48KB

  • MD5

    20799bc55b8c1ce917f3ccf363b6e5dc

  • SHA1

    8d56851f7d9fa6bb8e79961da2bebaaae23893f6

  • SHA256

    75e5cc4a0b07d6ebe301388cb75527b992ce4cd1bd224fe7e6d6e63fbabefd89

  • SHA512

    9e4471c856cf5e1e941983016964524eb09b2b688f681ccd4f118a99547ba78135a2f5b774e04da84eef2d8aca0b19feee4643f7e34249ae8e408cca494c673e

  • SSDEEP

    768:wGxG8ftqr1Hq4nbAyUilCamQV2YlyW4Xw9cxK9uN3UAC8wTreLXP:wcrftqr1HXpUizCWPcxx/zAeLXP

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20799bc55b8c1ce917f3ccf363b6e5dc.exe
    "C:\Users\Admin\AppData\Local\Temp\20799bc55b8c1ce917f3ccf363b6e5dc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\kernel32.exe
      "C:\Users\Admin\AppData\Local\Temp\kernel32.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:2676
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\20799bc55b8c1ce917f3ccf363b6e5dc.doc"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2820
      • C:\Users\Admin\AppData\Local\Temp\abs.exe
        "C:\Users\Admin\AppData\Local\Temp\abs.exe" C:\Users\Admin\AppData\Local\Temp\20799bc55b8c1ce917f3ccf363b6e5dc.exe C:\Users\Admin\AppData\Local\Temp\20799bc55b8c1ce917f3ccf363b6e5dc.doc
        2⤵
        • Deletes itself
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2728
    • C:\Windows\system32\winlogon.exe
      winlogon.exe
      1⤵
        PID:420
      • C:\Windows\SysWOW64\kernel32.exe
        C:\Windows\SysWOW64\kernel32.exe -k netsvcs
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3052

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\20799bc55b8c1ce917f3ccf363b6e5dc.doc

        Filesize

        20KB

        MD5

        e34eea040e37629191291d77591e93ec

        SHA1

        c53623b4b5b6e1c6fb2cd3444b57d4854a261db1

        SHA256

        3086b360e0cd9d7ddf3e04f099d50a392325e7378821fe21d6ccb16eff4bec95

        SHA512

        e66372b178f6aab2247b47ecf8bee0fcd75504fbf7ba26e7d2c7fced0fa69add605adf0ab0073105dc7811ee11d6ac848335af4e158de74d21e29874c7bd18a1

      • C:\Users\Admin\AppData\Local\Temp\abs.exe

        Filesize

        48KB

        MD5

        20799bc55b8c1ce917f3ccf363b6e5dc

        SHA1

        8d56851f7d9fa6bb8e79961da2bebaaae23893f6

        SHA256

        75e5cc4a0b07d6ebe301388cb75527b992ce4cd1bd224fe7e6d6e63fbabefd89

        SHA512

        9e4471c856cf5e1e941983016964524eb09b2b688f681ccd4f118a99547ba78135a2f5b774e04da84eef2d8aca0b19feee4643f7e34249ae8e408cca494c673e

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        a62cc2f7b57cb356ce25bdd3a8142ba8

        SHA1

        2bb2334bd49acb6c2bed66c4f179163445d4669d

        SHA256

        97cac89c0ab00d27989dc64cd106f760a7c91b22cff131eea899a02435fb2f8f

        SHA512

        9d03a8b3ef2fa57d4691749ec67a11c80f144926cc7076dac475c4a9fdd5a0a93d66c06e3eda8a161edd986685022e9c07f7396915b73f342069d1da6c653094

      • C:\Windows\SysWOW64\kernel32.dfg

        Filesize

        46B

        MD5

        180d4525a54f6e370785134421bfc6c5

        SHA1

        e183da9ec06f5a4eddb5988437a9c0a0746ce4fa

        SHA256

        35f559607a554f4b62529ca15116933b956a9d8f320cc1b44ad39b9f0f856930

        SHA512

        61353a378188b7aee89cfefabd33b21e5f54bfc78c07f177ec0fa0dde75feab44895ed8c4e1290139e41bc396950c499795dc70526a9aea2ed3f86be3bc42455

      • \Users\Admin\AppData\Local\Temp\kernel32.exe

        Filesize

        14KB

        MD5

        7cb65bc64fc13cf8bf95a1ff220c784e

        SHA1

        a54ad63f33ae7bc6bd19de627c8d3ba9293d5740

        SHA256

        4bebee57f3ca48df6a8ece900954484905a67aaa1806ff65933ba94f61c4f539

        SHA512

        7ca01662c1f2407d7555d0de8113f9945a58047a928a8569649ca7968a683cc1070b319c9de6a2655da80b1cd75c6fc5f806b69acd59c505273b4269cea57790

      • memory/420-47-0x00000000000C0000-0x00000000000C1000-memory.dmp

        Filesize

        4KB

      • memory/2676-44-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/2676-13-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/2728-28-0x0000000000400000-0x000000000040C000-memory.dmp

        Filesize

        48KB

      • memory/2796-30-0x00000000720ED000-0x00000000720F8000-memory.dmp

        Filesize

        44KB

      • memory/2796-15-0x000000002F671000-0x000000002F672000-memory.dmp

        Filesize

        4KB

      • memory/2796-29-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2796-51-0x00000000720ED000-0x00000000720F8000-memory.dmp

        Filesize

        44KB

      • memory/2796-66-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2964-25-0x00000000024A0000-0x00000000024AC000-memory.dmp

        Filesize

        48KB

      • memory/2964-21-0x00000000024A0000-0x00000000024AC000-memory.dmp

        Filesize

        48KB

      • memory/2964-0-0x0000000000400000-0x000000000040C000-memory.dmp

        Filesize

        48KB

      • memory/2964-14-0x0000000002480000-0x00000000024B9000-memory.dmp

        Filesize

        228KB

      • memory/2964-26-0x0000000000400000-0x000000000040C000-memory.dmp

        Filesize

        48KB

      • memory/2964-11-0x0000000002480000-0x00000000024B9000-memory.dmp

        Filesize

        228KB

      • memory/3052-38-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/3052-50-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB