Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 17:10

General

  • Target

    2fd909b0064cfb45888c0e2ed57057af.exe

  • Size

    134KB

  • MD5

    2fd909b0064cfb45888c0e2ed57057af

  • SHA1

    8025a807f067e975467fc6f01fb5ea80706ace35

  • SHA256

    8e18ce0fcf3a245cd6c93befaac0b7c9ec9da415dbfe2dcd5460af71d01a9883

  • SHA512

    32023b34503ad33093d17238992855de938daab54bb2a97df7f92264fe24074944d3891cd031d05a579caead58ce96396c2b2aa266b5d7ee5d33dbc3528e2d6c

  • SSDEEP

    3072:Dxaw7lEvFCsE8uKqMJBrHnsAWNqubkdBytQlaVrAUdB1/:TlFstuKqMJ9Hn5WNqub/tpV841

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 21 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fd909b0064cfb45888c0e2ed57057af.exe
    "C:\Users\Admin\AppData\Local\Temp\2fd909b0064cfb45888c0e2ed57057af.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\2fd909b0064cfb45888c0e2ed57057af.exe
      "C:\Users\Admin\AppData\Local\Temp\2fd909b0064cfb45888c0e2ed57057af.exe"
      2⤵
      • Checks whether UAC is enabled
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:760
      • C:\Windows\trys.exe
        "C:\Windows\trys.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1776
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\WVJKF.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2180
  • C:\Windows\SysWOW64\reg.exe
    REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Ineter Mc" /t REG_SZ /d "C:\Windows\trys.exe" /f
    1⤵
    • Adds Run key to start application
    PID:2084

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\WVJKF.bat

          Filesize

          115B

          MD5

          721f40b829b989f3ed90feba41b75b51

          SHA1

          0bc3e723b65a94c6ffbb8e0b32c9aaa24d10fefd

          SHA256

          641cbc8ccc1d7ffe1030ff40ea930cad57a855c5fa275bff57745b62d4545a15

          SHA512

          d11fa35712baa83380b1515242d85c1ce84ade1bd3e62144906b40c6e2d42c748d7813faaf05e5514048be3ae47fb29986e0a808c93eabf7128f31300c4d972f

        • C:\Windows\trys.exe

          Filesize

          134KB

          MD5

          a58f7aae8dc8d2f60cb36d7129b79213

          SHA1

          37b8c6533b801aefbc9457e1dc0b099b8ad1aed3

          SHA256

          2f7c6a6955be912146dc8210e9ca024eb4ff9cd76a299ee50d58f04b19f4aa99

          SHA512

          fc0e70a0cb40a911ad9c8018d9585eba2b60cb7a79100a15bc58842ced74042f7ec80203160bc4c6369d4fff84a3a24412b48bce115437814b83a01a0c6dc505

        • memory/760-315500-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/760-315506-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/760-327724-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/760-315543-0x00000000033D0000-0x0000000003440000-memory.dmp

          Filesize

          448KB

        • memory/760-345272-0x00000000033D0000-0x0000000003440000-memory.dmp

          Filesize

          448KB

        • memory/760-315518-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/760-315515-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/760-315514-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/760-315513-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/760-315554-0x00000000033D0000-0x0000000003440000-memory.dmp

          Filesize

          448KB

        • memory/760-315508-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/760-315551-0x00000000033D0000-0x0000000003440000-memory.dmp

          Filesize

          448KB

        • memory/760-315504-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/760-315502-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/760-345270-0x00000000033D0000-0x0000000003440000-memory.dmp

          Filesize

          448KB

        • memory/760-337491-0x00000000033D0000-0x0000000003440000-memory.dmp

          Filesize

          448KB

        • memory/760-337488-0x00000000033D0000-0x0000000003440000-memory.dmp

          Filesize

          448KB

        • memory/760-315552-0x00000000033D0000-0x0000000003440000-memory.dmp

          Filesize

          448KB

        • memory/1776-315638-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/1776-315555-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/1776-345274-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/1776-384019-0x0000000001EB0000-0x0000000001EB1000-memory.dmp

          Filesize

          4KB

        • memory/1776-315568-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/1776-315608-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2896-315510-0x00000000026D0000-0x0000000002740000-memory.dmp

          Filesize

          448KB

        • memory/2896-327722-0x00000000026D0000-0x0000000002740000-memory.dmp

          Filesize

          448KB

        • memory/2896-47-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2896-85-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2896-49-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2896-1-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2896-315511-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2896-31578-0x0000000000400000-0x0000000000470000-memory.dmp

          Filesize

          448KB

        • memory/2896-3-0x00000000001D0000-0x00000000001D1000-memory.dmp

          Filesize

          4KB