Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 15:19

General

  • Target

    28c6034dc13ef0e2b698e0727b63ff2e.exe

  • Size

    212KB

  • MD5

    28c6034dc13ef0e2b698e0727b63ff2e

  • SHA1

    a843d1343435822d258a79c466fbf4467720321b

  • SHA256

    9ab36fc25c0d3dcd810216b0abbfac8f438ab5f64528b954b762f44b642e3bf6

  • SHA512

    1438865c11f49adfa24a69bc393d7a50fe0e4c833c22ea42d2153d219a3837e85e284f76956b33553f7b12f1c383fae92ae5626c2c56983ac3a3ac529de8632e

  • SSDEEP

    3072:D9UB99PLzx+sJhGYiNAcXOqQnys80/p5GomjRMEQYbLlmuPU+BfPc1rPU35pJuct:DqBjxEOqQn580/JXEJpc1rPYJn

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28c6034dc13ef0e2b698e0727b63ff2e.exe
    "C:\Users\Admin\AppData\Local\Temp\28c6034dc13ef0e2b698e0727b63ff2e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\heexeoq.exe
      "C:\Users\Admin\heexeoq.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2176

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\heexeoq.exe

          Filesize

          92KB

          MD5

          220af695564e533f2d9e9f29583b9fda

          SHA1

          97328fcd0f87b618fb0fe14de0c57870429dfcbd

          SHA256

          63d9350bb5c76b72ded3531dcbb0bf51311bb0c7454b3df564e7715a13d10a79

          SHA512

          eb697fbab01b2977c38913f081993bd88387781268782b4a6a8989066f65f2cfd4772d0014dbba8b4a7d38b610134c96ba8c07b2cbcab43376529b3233d2d308

        • \Users\Admin\heexeoq.exe

          Filesize

          212KB

          MD5

          562387e7071c1c54e141e3fca3e3187e

          SHA1

          ce103156e7ebf94d4e41ee993282b21236814c7b

          SHA256

          29513a215fc1b68f2f99b23725eb37240e759fa5facd7319e6891c6cf4310579

          SHA512

          2351bb96afc2df8978af311844378687350db3a4e71cc28b367366f340a1c60966d50233a05e8592595036a13649e9f1f09c712deaa2cfe76a63f2f636fd8cab

        • memory/2176-15-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/2176-20-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/2888-0-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/2888-9-0x00000000025E0000-0x000000000261D000-memory.dmp

          Filesize

          244KB

        • memory/2888-19-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB