Analysis

  • max time kernel
    143s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 11:01

General

  • Target

    694bee946ed34b1ba426d9cbd20f1ad5.exe

  • Size

    54KB

  • MD5

    694bee946ed34b1ba426d9cbd20f1ad5

  • SHA1

    960e7176f3311bfb921c8b48c6598a129aa83905

  • SHA256

    eaf7f2337fd37afb1315b03a94ddabe47f960547e08df0f4698ba556a815d41f

  • SHA512

    d200e5fe7d3cb2e8c69e25e52611980171bc51574eeb12d377990c99db0a5ad4f62d34470906e52479fd35c811dd04df5086c75b743f2e11c9b156ccc4f33e19

  • SSDEEP

    768:ldPrFwRYFapYstQQ2kDDIiJgLhHtR1krnGOVZWnrtvUsonlJVoJa9b1nY:ltFw9tQQ2krgLdt8jKrtvUsUJoJM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\694bee946ed34b1ba426d9cbd20f1ad5.exe
    "C:\Users\Admin\AppData\Local\Temp\694bee946ed34b1ba426d9cbd20f1ad5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Windows\SysWOW64\socketme.exe
      "C:\Windows\System32\socketme.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\32syslib.dll

    Filesize

    5KB

    MD5

    0b5eccbf1ac781014e6831d099ee15db

    SHA1

    527e331e2f2e8a9e955f5070f563394ed17d631f

    SHA256

    be50aab08c66c05ddc815c5d4cfdec3f446c4c45a30495bf18f3f80c0788cec8

    SHA512

    e4a3799eb7b6ee20af4f34b68c0bd11a890c95d6aa9ff0d518c8edff7932da71aa1e0ac8f2ea963f805965a877ed63c12f895f185fb07015272a136f603a25bb

  • C:\Windows\SysWOW64\hide.dll

    Filesize

    21KB

    MD5

    544f25499be553eee4fa3f8b2d482685

    SHA1

    be43b0060e94527506f5fdbafe1f5a3fdb84ecf7

    SHA256

    a9645fac0341243c47bc9408fd771096664e03b7a8a31351e2ec799a47b31b9b

    SHA512

    453b6c58a80a02dede9f9c54fdda62c8dad30badf9f93f24d8a857b7c6f7be95946bf26c9a478c90e967e5a183c2564675afff3514d772042f645a3dd84f7a3a

  • \Windows\SysWOW64\socketme.exe

    Filesize

    54KB

    MD5

    694bee946ed34b1ba426d9cbd20f1ad5

    SHA1

    960e7176f3311bfb921c8b48c6598a129aa83905

    SHA256

    eaf7f2337fd37afb1315b03a94ddabe47f960547e08df0f4698ba556a815d41f

    SHA512

    d200e5fe7d3cb2e8c69e25e52611980171bc51574eeb12d377990c99db0a5ad4f62d34470906e52479fd35c811dd04df5086c75b743f2e11c9b156ccc4f33e19

  • memory/2080-20-0x0000000000290000-0x000000000029A000-memory.dmp

    Filesize

    40KB

  • memory/2080-21-0x0000000000290000-0x000000000029A000-memory.dmp

    Filesize

    40KB