Analysis

  • max time kernel
    151s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 01:52

General

  • Target

    4aa76b2fc85ed3c123f14e04317b627a.exe

  • Size

    96KB

  • MD5

    4aa76b2fc85ed3c123f14e04317b627a

  • SHA1

    1d93602c0d670b59be894669a7a711515b017531

  • SHA256

    33da47017dcdfa6956213e45e4dd4d79f2e7f90a66a834afc4a34be7a41219f5

  • SHA512

    8d9dcb0d74b82b0e673c4c87db2481cb4e8773fc2028802898d93ee0fb9259645328cd7f2eb795e336bafd3138667761e6079bc168e853268e765d5b180e889c

  • SSDEEP

    1536:vWQccdJEsTCfNEHYkJouJjcXCSuyAn7ZtOq13i6E:6sckJouJjcg9t

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4aa76b2fc85ed3c123f14e04317b627a.exe
    "C:\Users\Admin\AppData\Local\Temp\4aa76b2fc85ed3c123f14e04317b627a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\qaaufa.exe
      "C:\Users\Admin\qaaufa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\qaaufa.exe

    Filesize

    39KB

    MD5

    8842c7aa4931557bffc8b84d5e260163

    SHA1

    b4cbb426d8066813483ac056ece843a5ae54bb3d

    SHA256

    46aace9f568159693e9e4b391467f922a2c32311dd6f4f64d945b076f75f354f

    SHA512

    dc2de4656790c9b6f63556018b47c66423c1ee4a8a59e643c05788f16a8ed38bb7e91195d0e5e16505799209eaeb2783e872e8569e5f018270391be61ebb21b2

  • C:\Users\Admin\qaaufa.exe

    Filesize

    96KB

    MD5

    523172a61d98229ce77f705c7de6ee3d

    SHA1

    2674d74b7e401dbe131e385660f31df96efec0a0

    SHA256

    77d7a86e411885363ac1c3e765b774332e0c249dde073aaa66b11a452cfeff08

    SHA512

    cf300a41a0b3453d4bbdb0426af19e9b97c9521b179119c144351041af5ed4fea7b476e92dde09a9bbe9ac31ab345612829cd05b3a638322bbd54af6a916a266