Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 19:16

General

  • Target

    373c8aa42ba6d9107d9768f698f38838.exe

  • Size

    18KB

  • MD5

    373c8aa42ba6d9107d9768f698f38838

  • SHA1

    eb09190164947696649fdf8b7bad0cd86d787e5b

  • SHA256

    75fb6872dca0bf3598c17e011f8cda935e7b93e7a7b63f109d61f491fca0c643

  • SHA512

    f7bf0576ce10c35fb33df30c2786fef148a048625052c5623e4bd2867d402467b2cb8e6a9e5ce712bdd996c939db9a8d1636cb4a70a58e39be58d5198b11b46e

  • SSDEEP

    384:22B5qa6ngcMDBd5184bzhI/z2wQkSsCD+YKJ0wj:Tbz84iL2wQLsCT

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1216
      • C:\Users\Admin\AppData\Local\Temp\373c8aa42ba6d9107d9768f698f38838.exe
        "C:\Users\Admin\AppData\Local\Temp\373c8aa42ba6d9107d9768f698f38838.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1216-3-0x0000000002A60000-0x0000000002A61000-memory.dmp

      Filesize

      4KB

    • memory/2924-0-0x0000000000400000-0x0000000000411000-memory.dmp

      Filesize

      68KB

    • memory/2924-20-0x0000000000400000-0x0000000000411000-memory.dmp

      Filesize

      68KB

    • memory/2924-16-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2924-12-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB