Analysis

  • max time kernel
    145s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 04:14

General

  • Target

    533a7dbf86c09faa41582c2667704d6a.exe

  • Size

    60KB

  • MD5

    533a7dbf86c09faa41582c2667704d6a

  • SHA1

    8d02c26bd9964f61659d7e7bbd10b9a18f6f9bdb

  • SHA256

    cff2688925162938aece0c55ffa49b346d8bd5cab177c8d4250befbd098d0536

  • SHA512

    ed94fce2c35d33e7cb19903f990dc0c2573b8880ab1ae14574869a0df28e3658f1f95f538c41202ce77bcefc7986ed0300b6cb40219ffac92d3e19de46eddf4d

  • SSDEEP

    1536:adrC+sr5GfbQ26SvrFrlLXtwrUidKbRt:yfbQUrFpLgdKlt

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies data under HKEY_USERS 10 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\533a7dbf86c09faa41582c2667704d6a.exe
    "C:\Users\Admin\AppData\Local\Temp\533a7dbf86c09faa41582c2667704d6a.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Modifies data under HKEY_USERS
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Users\Admin\AppData\Roaming\ieudinit.exe
      C:\Users\Admin\AppData\Roaming\ieudinit.exe /waitservice
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\MICROS~1\cmstp.exe

    Filesize

    60KB

    MD5

    533a7dbf86c09faa41582c2667704d6a

    SHA1

    8d02c26bd9964f61659d7e7bbd10b9a18f6f9bdb

    SHA256

    cff2688925162938aece0c55ffa49b346d8bd5cab177c8d4250befbd098d0536

    SHA512

    ed94fce2c35d33e7cb19903f990dc0c2573b8880ab1ae14574869a0df28e3658f1f95f538c41202ce77bcefc7986ed0300b6cb40219ffac92d3e19de46eddf4d