Analysis

  • max time kernel
    148s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 07:27

General

  • Target

    5c7eab8583f6e0902b4cae42627d332e.exe

  • Size

    96KB

  • MD5

    5c7eab8583f6e0902b4cae42627d332e

  • SHA1

    8ec00504ec21d5d91facf95ff9d42301c3259d2e

  • SHA256

    18a13b6b15ef7ea640272f5b4715db3e1758f2ea49ad1223c21b8a13f9fe1c83

  • SHA512

    1063ebfc7d804b50d9ec0048e111ca53d38b8445315906cc71eb396b60b51de1b45d028f3b5904808630ece97009d686eec86a31f5c577cecb585e1dbf3fa157

  • SSDEEP

    1536:PkUEg52tg9tyVQO8P8ych70wjj3RJNEo/knRzdnynE7RldNEP8lijOezNIjnZ/JM:PZE/tgelych9zR3Ek65RldqzCnpJTo

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c7eab8583f6e0902b4cae42627d332e.exe
    "C:\Users\Admin\AppData\Local\Temp\5c7eab8583f6e0902b4cae42627d332e.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Users\Admin\haexae.exe
      "C:\Users\Admin\haexae.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\haexae.exe

    Filesize

    96KB

    MD5

    e30f4925652025d33774215e39a7ef48

    SHA1

    7d793b7bd4f1a1f4ed25038f3da39e73b2927790

    SHA256

    f7c55399d67c31b7943653e4eaeca8c0e33b8af4c00b331a63b00118d54b1291

    SHA512

    e390e0a1e763d2544fa6c5ea4c8efc278ac5a9028e7736c19b96e02ca06da68f64b49eef05b7f101977b79db70cb064f01fe7a3c4cd03445ff97e936b6a30f46