Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 01:29

General

  • Target

    49631a98ce6ff91370cd1d6d0f90a083.exe

  • Size

    29KB

  • MD5

    49631a98ce6ff91370cd1d6d0f90a083

  • SHA1

    c19b8a52222bbf3c3b55f1bdb9383a76e84107c1

  • SHA256

    33ef02da1169a63c03748ad431fe60fc3600996663e93a909c910008be43872e

  • SHA512

    4d62e6ffc4404ab0fcc6bbfab1626b358b546c0a3ea4de974a5fa005cdf549685582b8212cc67af770eb740565a7711fc4dc1401dc314f05c7e22a0377aa4ea2

  • SSDEEP

    768:j+Fmr6Wit2zShufZTMSE73suEHnbcuyD7UQNf:iF92G61Hnouy8gf

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 63 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49631a98ce6ff91370cd1d6d0f90a083.exe
    "C:\Users\Admin\AppData\Local\Temp\49631a98ce6ff91370cd1d6d0f90a083.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\259417073.CPL

    Filesize

    11.8MB

    MD5

    49da592544470a33e3761136de613da5

    SHA1

    9dbae5bab483aecf3f125f0c1507c72ab337d5de

    SHA256

    26a1a1979c470a63a6a64d97a2e6c1a8267e98367f96cd0dedc93b0a3e70b084

    SHA512

    e0e0bcf5d6b84b31e239f2ba7617a3f6dcc487c66eec06bf4f14151d4d14b83be23e6adb7e801db6148848dda0091244b720bd3aa9359df27e434e056e230d6a

  • memory/2172-0-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2172-5-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB