Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 14:16

General

  • Target

    24c6e3ca5d60cf6f3e916daa3c71bc57.exe

  • Size

    2.0MB

  • MD5

    24c6e3ca5d60cf6f3e916daa3c71bc57

  • SHA1

    c6ed217e8e6ab45cb4e8ca0452010130bfb2245c

  • SHA256

    20bc1c63ba52434543357e51f6143e5e1e4fdfaa5d14f4768ab2d0e7b35a1475

  • SHA512

    ca192a95fbd9af212c8bb0531312a193d71b6de84119b7dd8279aa53fd95888909b368c73432f8f0b62389afe230b9728c085976780d734b03ac90e518fe94c7

  • SSDEEP

    49152:5rvPcrjPlesxE/8lJCXrZKPv3AsHtYzxlXsgIdcabb4NRKQzSwP+1v/I:5j0rjlOW0XlKPPFtYrXWc2bPQGwyvA

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24c6e3ca5d60cf6f3e916daa3c71bc57.exe
    "C:\Users\Admin\AppData\Local\Temp\24c6e3ca5d60cf6f3e916daa3c71bc57.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nso144E.tmp\System.dll

    Filesize

    10KB

    MD5

    2b54369538b0fb45e1bb9f49f71ce2db

    SHA1

    c20df42fda5854329e23826ba8f2015f506f7b92

    SHA256

    761dcdf12f41d119f49dbdca9bcab3928bbdfd8edd67e314d54689811f9d3e2f

    SHA512

    25e4898e3c082632dfd493756c4cc017decbef43ffa0b68f36d037841a33f2a1721f30314a85597ac30c7ecc99b7257ea43f3a903744179578a9c65fcf57a8b7

  • \Users\Admin\AppData\Local\Temp\nso144E.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    c6284e23cd7e4d11db8298deb4541083

    SHA1

    e338686c7579620383ab8cc5a51bbb8d846f60cf

    SHA256

    79914940cbbf70a385f13a9970a9d577d7a7e07d240fe44563b45a472cd4bc3f

    SHA512

    72103e470d770fb402a18e975ff339526a3e4c9aeb8fac1b0977995a6eace0eca965b1915404df9b5a25b59628db1b199d2b9b10372841309c137054356a5cd7