Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 16:50

General

  • Target

    2e8a58b1b4374d46117ad215c66fa068.exe

  • Size

    100KB

  • MD5

    2e8a58b1b4374d46117ad215c66fa068

  • SHA1

    5fe95b0bbc0e5f328bec8b9427b7e4596d98f7af

  • SHA256

    33b43f21b1e72569ddfd2a3a7a0e697bbd79720b012f24271bc1badde582d2fe

  • SHA512

    24ef3b641ea3eef3365531b9f375e69020d6bf846373abece3ee8f0ac279746a63930b6b9c6348963d85ff8e22716d78e344bebe3b8f8c6b1db665b693041c3a

  • SSDEEP

    1536:FlWEcX220mQdKdzxJKIRGWcOUP7vXArnY1ZqAefzyesdNIjnZyD:HIQkANAfzye6CnkD

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e8a58b1b4374d46117ad215c66fa068.exe
    "C:\Users\Admin\AppData\Local\Temp\2e8a58b1b4374d46117ad215c66fa068.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\heinio.exe
      "C:\Users\Admin\heinio.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\heinio.exe

    Filesize

    100KB

    MD5

    73d8daf66d7020e7172dd5ffb0bf84f8

    SHA1

    7e6e41e0458f05cba502c37087be18ac7f296628

    SHA256

    f8361e1d7fbec9699321609beaa300cd267b1328917f85cfa2511eca5cf7d1e3

    SHA512

    40fade63f2c421a7df7c7163ba7195bc16fc79bdb07ca87831acb6f92e898c1490aa65edf7379f862fc85d38cbde4dc39dd51239ac01df1aedd3437f73919ac9