Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 13:22

General

  • Target

    216ddf3320816f6c8d31dc59a2275fbb.exe

  • Size

    611KB

  • MD5

    216ddf3320816f6c8d31dc59a2275fbb

  • SHA1

    46b06da7d1dd7f0340135f11105a45e49ff7bdd7

  • SHA256

    ea08f3d33ba5f7f5fe4fb00380569fc21e374f6eee77dda2ceddbfd2bef5da9b

  • SHA512

    7f486b374d248e6d45aae103a0419d7842fd94dfb154a8e60ee5a148f5de4d161a5a3399defd8a522c911fb0b2784fe5d7f1163fdb153e625aeb8f827df74dc3

  • SSDEEP

    12288:fWvTTAfgp+Nz8o43TEazs5hzPRx1M4auuSJFfvHg:+LTAfBE3TEazs/tXdbuSLvHg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\216ddf3320816f6c8d31dc59a2275fbb.exe
    "C:\Users\Admin\AppData\Local\Temp\216ddf3320816f6c8d31dc59a2275fbb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\n6473\s6473.exe
      "C:\Users\Admin\AppData\Local\Temp\n6473\s6473.exe" 94d5aa02b056d2b0d81a27b7QGC8QTK47o+CFXhCLRTfai0xn+i89RTD3jE8qMcjGSRDv3UwHarzmMS3J3keiJWAf6j9nuRYUyBP6GGi07gL0+8pEI2K2UBA0attFGpncNNYBhjX9WBsl3mhMPhhpRn1SQjyLGosKSl81xxCDpneUxhLG8U9oMuDmn7oewk= /v "C:\Users\Admin\AppData\Local\Temp\216ddf3320816f6c8d31dc59a2275fbb.exe" /a
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2304

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Cab4990.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar49B2.tmp

          Filesize

          171KB

          MD5

          9c0c641c06238516f27941aa1166d427

          SHA1

          64cd549fb8cf014fcd9312aa7a5b023847b6c977

          SHA256

          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

          SHA512

          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

        • \Users\Admin\AppData\Local\Temp\n6473\s6473.exe

          Filesize

          351KB

          MD5

          441952171f5862888c657eff54344b3a

          SHA1

          560a322d08f59c920ef6df95858ccffae0d0db83

          SHA256

          b249e9d194fcc51dce926f71ce16b3ff47d1302f0c1c0940a488c46ac00e9c8f

          SHA512

          0c7fa23991ad0ac0996d6aea7233f7c2d906f53dbcecf52e28e9b9a2b98909a92aee93dfeaad36e6094f3ec0a793bbd44331bea095cdb7614909a2d4e6fb76e1

        • memory/2304-130-0x0000000000530000-0x00000000005B0000-memory.dmp

          Filesize

          512KB

        • memory/2304-132-0x0000000000530000-0x00000000005B0000-memory.dmp

          Filesize

          512KB

        • memory/2304-127-0x0000000000620000-0x0000000000630000-memory.dmp

          Filesize

          64KB

        • memory/2304-128-0x0000000000530000-0x00000000005B0000-memory.dmp

          Filesize

          512KB

        • memory/2304-129-0x0000000000530000-0x00000000005B0000-memory.dmp

          Filesize

          512KB

        • memory/2304-24-0x000007FEF52A0000-0x000007FEF5C3D000-memory.dmp

          Filesize

          9.6MB

        • memory/2304-131-0x0000000000530000-0x00000000005B0000-memory.dmp

          Filesize

          512KB

        • memory/2304-25-0x0000000000530000-0x00000000005B0000-memory.dmp

          Filesize

          512KB

        • memory/2304-133-0x0000000000530000-0x00000000005B0000-memory.dmp

          Filesize

          512KB

        • memory/2304-134-0x0000000000530000-0x00000000005B0000-memory.dmp

          Filesize

          512KB

        • memory/2304-135-0x000007FEF52A0000-0x000007FEF5C3D000-memory.dmp

          Filesize

          9.6MB

        • memory/2304-136-0x0000000000530000-0x00000000005B0000-memory.dmp

          Filesize

          512KB

        • memory/2304-137-0x0000000000530000-0x00000000005B0000-memory.dmp

          Filesize

          512KB

        • memory/2304-139-0x0000000000530000-0x00000000005B0000-memory.dmp

          Filesize

          512KB

        • memory/2304-138-0x000007FEF52A0000-0x000007FEF5C3D000-memory.dmp

          Filesize

          9.6MB