Analysis

  • max time kernel
    240s
  • max time network
    281s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 15:12

General

  • Target

    284f70d2dbf419c70a6f2d345116bdfe.exe

  • Size

    207KB

  • MD5

    284f70d2dbf419c70a6f2d345116bdfe

  • SHA1

    aaa10108e3b3975bad75ae973d11fa26d43bcbe1

  • SHA256

    139beb0e5b4cc80f0825fa410ed6288db8dd21b40c9f4b3bde8857e73443c309

  • SHA512

    9b48123f356459408d9d10dc1886cc5200faabe0a68c062cb110bd0704b8151575dfd15e062686270a007a7a411c0be83fad7d5d393db583ac2f5a7e56702c1d

  • SSDEEP

    6144:Xz+92mhAMJ/cPl3iwjaozlx/LVXHSPF0Mfs:XK2mhAMJ/cPl1T7VXJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\284f70d2dbf419c70a6f2d345116bdfe.exe
    "C:\Users\Admin\AppData\Local\Temp\284f70d2dbf419c70a6f2d345116bdfe.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\wsmallstub.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\wsmallstub.exe" "C:\Users\Admin\AppData\Local\Temp\284f70d2dbf419c70a6f2d345116bdfe.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:672
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://ct2416693.ourtoolbar.com/cre/?isorganic=true&requesterid=dmstub
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2912
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2912 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\icon.ico

    Filesize

    1KB

    MD5

    f31ab27282cf444ef1f263320be6b705

    SHA1

    bde4d76ffc88d14e1128b4928ddd4639a7744b84

    SHA256

    1a3ec42f393635307ae2e369ef50a8eb0fbbe02cd2f82c4c6d3486d294ddcceb

    SHA512

    f6b803b087444de0cc6fa832c4be491c738c0d643895d844a861357e2b29257fe7ba91f2e4e61ee715a5b533b0449c14428f79ec651f3cfa3823eaaaa99ca367

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\stub_settings.xml

    Filesize

    3KB

    MD5

    b64d43be07c431b8b2477f7303b2a8e2

    SHA1

    e42f245ac4078f8b84e85514574244846c483157

    SHA256

    4fd26dc9c1e6f863b7365d24559f55c39e1c07741e3cbba9f45175198e969256

    SHA512

    2fcc9516db288e2cd7876057db6e7172b0b9775f8b094ab8547aac0e3075bd4c0f34ec575692d68afb77e853c86fa85e973a727dc0629dd869e14929f5012b80

  • \Users\Admin\AppData\Local\Temp\RarSFX0\wsmallstub.exe

    Filesize

    238KB

    MD5

    bebe87e70601cbc95c4a6bad2a2e986d

    SHA1

    f9620534bf97ff4ecaadd3afc3808d3abecdac65

    SHA256

    f1fe856f82e455e19d17f09e0b8529993aa540d4231c07065f0c28ecf0f25dd4

    SHA512

    dae6eabf8314529be871d56c4c573cc114309d77a5223f48227d0c13964cd6606efbe413e8b1fdd7624be89fc31be8caa7d299ed2e659f9c4e1982f21e1cffd2