Analysis

  • max time kernel
    151s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 14:24

General

  • Target

    254b2689b075095ffa49da2f115f736b.exe

  • Size

    296KB

  • MD5

    254b2689b075095ffa49da2f115f736b

  • SHA1

    0c76aab3f9be0f1440c95f7a2f563407e29b91ee

  • SHA256

    682f6caf63fd6e5bd13d8775e81a0f7e8a219b008e0840742d0b77b47f80e3a5

  • SHA512

    fa71920465ed06a2c3c27d3403bad2d8aced19810eac62a7e8ea704242d06053fdf0fe146c4434dda9b45730634b0dba07a6922e97bfd39a92cb696012cdc650

  • SSDEEP

    6144:wkFD1y0FXrKnvmb7/D26OJYPsMiqDJlJNwHG60Ja20EBb4jHX3QA/hwNGhWhThP1:wyD1y0F7Knvmb7/D265DJlJNwHG6sTbX

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\254b2689b075095ffa49da2f115f736b.exe
    "C:\Users\Admin\AppData\Local\Temp\254b2689b075095ffa49da2f115f736b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\foeuyu.exe
      "C:\Users\Admin\foeuyu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2296

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\foeuyu.exe

          Filesize

          296KB

          MD5

          a61b386120a7a0b1e01dabc1c40c1b1b

          SHA1

          380423c9015c3a621778af4bf72068733f07c6a1

          SHA256

          edbe8c18c0fc60983c1ad30e782d3918dc521a6e5c7fff0d74306a3d5feb61d5

          SHA512

          bac8a91d34d922840d614a1832d286773f81ec13474167992cc655ffafcd23f538139edd9a7e852073d5f883afbf5fb92bc648ab17235ddce9dd2d973cbad9c1