Analysis

  • max time kernel
    132s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 18:34

General

  • Target

    34e3d80893618ba4e68f081c4b4fd46e.exe

  • Size

    313KB

  • MD5

    34e3d80893618ba4e68f081c4b4fd46e

  • SHA1

    232f06dcb6142260febf5a6efcbd7f01f5a2acac

  • SHA256

    2276a964aea8abc6033b763d7546291a5ff48f30df01cd57b1a8b2c0dbbdd6a3

  • SHA512

    b46da3f58e034f224ed002fa87ee822e2f0b2c9ef771ec117ca2486979ce4e3c0aa59a30cb792150f7a5f4117d7c340bafed3412fd088dd3dcf0b215f2e2a0f7

  • SSDEEP

    6144:/rb9uEo2S1YnQmCX492DkwNP3qpYFl2YyPuFITzyccux7rnrOzprCoM8:/rRu6/eIo4t3PuFITKUAn

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34e3d80893618ba4e68f081c4b4fd46e.exe
    "C:\Users\Admin\AppData\Local\Temp\34e3d80893618ba4e68f081c4b4fd46e.exe"
    1⤵
    • Loads dropped DLL
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\Tsu89101873.dll

    Filesize

    269KB

    MD5

    af7ce801c8471c5cd19b366333c153c4

    SHA1

    4267749d020a362edbd25434ad65f98b073581f1

    SHA256

    cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e

    SHA512

    88655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c

  • \Users\Admin\AppData\Local\Temp\{14CA19E5-C02C-4657-A4BC-880ECF293B13}\Custom.dll

    Filesize

    54KB

    MD5

    8ce25717d5827206baaee8d28b13ccfa

    SHA1

    987cf87e2e573413805fae457de2f35268f301f8

    SHA256

    d23cc1960f9d9b17d603f0e295ca6ad51ce12fc97e7caa4660d16fe9a2f02d1a

    SHA512

    6764dc1b8cadd8fb21df988cd028aa7f5313f2a8f7bbfb3833d5864232e8551434519cc1b26741f7f735237934f1830a75d4f1ead9a74334587c5e30fa015ec6

  • \Users\Admin\AppData\Local\Temp\{14CA19E5-C02C-4657-A4BC-880ECF293B13}\_Setup.dll

    Filesize

    59KB

    MD5

    b553accf72b5e17e3cff98b2d4da3132

    SHA1

    c3254cb4c6a2484a87c391084b6358f11ceb8094

    SHA256

    e100d28aa66153cbf6d5faec5bcbd1b9e5f6717e5f9f96b5c9c0efe45ce02751

    SHA512

    1f228423efa4937e03c0243dc9f7a9b97afeef85d74c0105c140ca60013e7c2ba88ad0cfc5045eedeadc3631c7317185fde30c86d84189fe350da1880bf904c0