Analysis

  • max time kernel
    94s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 05:12

General

  • Target

    570714a251ef66152484906ea667dcef.exe

  • Size

    360KB

  • MD5

    570714a251ef66152484906ea667dcef

  • SHA1

    14132f3cc59218998c96a6a825854b76c9e979dd

  • SHA256

    f20ac5e50db1959ae62cffc07ac19460866b8467faac93c5efd12df8d09905ab

  • SHA512

    570cb5a6b94ba047b5878aafcfc6d3df19fa73c0b82610df53fe460351b7abf75c8e820aaa2d8250aa86e3dc9d4e81b4834516e01bcc30f93489ba724cca165e

  • SSDEEP

    6144:tZtIk7t1aZMIvEl0E9/DIVpgAXL0LedMWs4QNJdaGcGGZ0GbNXht+6h0SItIBjMt:tZtIk51aZMIvEl0E9/DIVpgAXL0LedMn

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\570714a251ef66152484906ea667dcef.exe
    "C:\Users\Admin\AppData\Local\Temp\570714a251ef66152484906ea667dcef.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Users\Admin\ricew.exe
      "C:\Users\Admin\ricew.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Maps connected drives based on registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\ricew.exe

    Filesize

    360KB

    MD5

    570714a251ef66152484906ea667dcef

    SHA1

    14132f3cc59218998c96a6a825854b76c9e979dd

    SHA256

    f20ac5e50db1959ae62cffc07ac19460866b8467faac93c5efd12df8d09905ab

    SHA512

    570cb5a6b94ba047b5878aafcfc6d3df19fa73c0b82610df53fe460351b7abf75c8e820aaa2d8250aa86e3dc9d4e81b4834516e01bcc30f93489ba724cca165e