Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 16:06

General

  • Target

    2bbcfbfce14ec9384e4165edcecf8036.exe

  • Size

    362KB

  • MD5

    2bbcfbfce14ec9384e4165edcecf8036

  • SHA1

    a3f84a4ffb10d2ed7d5417695e803acde20d9ee8

  • SHA256

    b8975cca11e6d5e109d184013e4c8f816bfdaf2bb1bbd9624cacfc4eaa540128

  • SHA512

    6a79b7efdfc3de96e32c02a43bfabec8efcd2a32aa44fa8534c92045018a510c08f50f75878fe22b100e534a598b7e136d91523ce57c6cadd9f67c5e77157a3c

  • SSDEEP

    3072:GbR8Y6hDaAyQIrZBbSJbbR8Y6hDaAyQIrZBbSJbbR8Y6hDaAyQIrZB8:GbR8Y6lpYEbR8Y6lpYEbR8Y6lpYm

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bbcfbfce14ec9384e4165edcecf8036.exe
    "C:\Users\Admin\AppData\Local\Temp\2bbcfbfce14ec9384e4165edcecf8036.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Modifies registry class
    PID:1156
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2452

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1156-0-0x0000000000A70000-0x0000000000A8C000-memory.dmp

            Filesize

            112KB