Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 15:23

General

  • Target

    29010e15cce2beb45fa35c79a754ed83.exe

  • Size

    134KB

  • MD5

    29010e15cce2beb45fa35c79a754ed83

  • SHA1

    13a46acc96de386e6981c685dbaa80f3aaac411c

  • SHA256

    65bcfd513e062a990d1e074e43f37bc8d8a5336fbb2d9b99f0ec4654c5d8ea6f

  • SHA512

    f4940421c308e1bb1db86df1f4f7efa53ac99b010536c2b96c67609af58159bd777a1426ed61ce12def686fa7dc790a255920ea71514a70a72da9a531bb08d37

  • SSDEEP

    3072:S9Zu1RZHR4++Tz3saVFJjO6cbsCuCsywO/FzdXr:S9Zu1G/zjO6HWo+X

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29010e15cce2beb45fa35c79a754ed83.exe
    "C:\Users\Admin\AppData\Local\Temp\29010e15cce2beb45fa35c79a754ed83.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Windows\Xvodoa.exe
      C:\Windows\Xvodoa.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job

    Filesize

    344B

    MD5

    31d95fac4414fb8380fb152f7a7e821e

    SHA1

    cc6cd8723969ad37fe165551450495ed89546dba

    SHA256

    ccb615f118a06c2c9ba0768358e323d8d8e6de5f838aea5b6ac7024ed974e4c4

    SHA512

    2a5ae5a084007edd9fb4600b0aca939e64e53c90f09bc14a8cac1704854367ccfc1cd99b235e01fe666d0bfd236923813e55f0eb56be200514facd55e8767a88

  • C:\Windows\Xvodoa.exe

    Filesize

    134KB

    MD5

    29010e15cce2beb45fa35c79a754ed83

    SHA1

    13a46acc96de386e6981c685dbaa80f3aaac411c

    SHA256

    65bcfd513e062a990d1e074e43f37bc8d8a5336fbb2d9b99f0ec4654c5d8ea6f

    SHA512

    f4940421c308e1bb1db86df1f4f7efa53ac99b010536c2b96c67609af58159bd777a1426ed61ce12def686fa7dc790a255920ea71514a70a72da9a531bb08d37

  • memory/2508-16334-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2508-1-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2508-0-0x00000000006B0000-0x00000000006DA000-memory.dmp

    Filesize

    168KB

  • memory/2508-2681-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2716-24624-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2716-16333-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2716-8-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2716-38833-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2716-38949-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2716-47729-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2716-47730-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2716-47731-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2716-47732-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2716-47734-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2716-47738-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2716-47739-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB