Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 04:14

General

  • Target

    532f55176bb3d6b090057ea7e43e80e0.exe

  • Size

    92KB

  • MD5

    532f55176bb3d6b090057ea7e43e80e0

  • SHA1

    74dd47633bf45c17490eaa55b28bb201f155810e

  • SHA256

    7c953bf4664ba1cb0cc2b1a125bb0542112c09bc0820d1817a5d146f07262f50

  • SHA512

    6d26e831e2ab3f24e9aa2015d70698cfff26fb11f5c4fc545bada4c2701512c4a8f9f67f68ce2933dc930dd628634f84f3e15ad3f1066a6bd687d486e2380ffd

  • SSDEEP

    1536:LpiP7hPjjBkvWN/3HgGl+HJpwFJ0T72mocT:t07/HMQFJ0T72mBT

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\532f55176bb3d6b090057ea7e43e80e0.exe
    "C:\Users\Admin\AppData\Local\Temp\532f55176bb3d6b090057ea7e43e80e0.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\hoanu.exe
      "C:\Users\Admin\hoanu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\hoanu.exe

    Filesize

    92KB

    MD5

    e94a9a4389ad80bbb9cd68b7b8cb6c67

    SHA1

    93809a84b3bfb4963dda2bf8e672c5edfad5617a

    SHA256

    f2379892b25a6ec70ac281a229055352b134adb9f94f5b370a633fa3ac36a8c9

    SHA512

    6d8bdf9aeb18e9159b78c5abce3c089f85150765ecbfcb957147ff8ef2ba872cdd4d662abf425163ec17aa885a4cfe27824e90b1de47d328c5f93f808ca26df5

  • memory/1992-1-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1992-14-0x0000000002FD0000-0x0000000002FFA000-memory.dmp

    Filesize

    168KB

  • memory/1992-15-0x0000000002FD0000-0x0000000002FFA000-memory.dmp

    Filesize

    168KB

  • memory/2888-17-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB