Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 12:01

General

  • Target

    6ce14f6d74a647ad130553b96883b19d.exe

  • Size

    4.0MB

  • MD5

    6ce14f6d74a647ad130553b96883b19d

  • SHA1

    663441e7bbddc8aab40dfecc6221ee053d804f35

  • SHA256

    e137ea283fc0ee388e7ff35b34cca48d833a20f9e9f861082792cb7110a025c6

  • SHA512

    7624c1f6c813070b7b269e9951e284a8f9a07985ea75ecc87101277a4546643a0901202be913c5b6bb896cbc8ce0ce879aeb3e2365d69642031e4fa9066f8208

  • SSDEEP

    98304:xw84z9YiGzhe03zcgZeC+5LtUTjypkMlb7MO6NsjryMl+lW:xw7nGzhR3zcgQpBtUyeMlbwO6sXqg

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ce14f6d74a647ad130553b96883b19d.exe
    "C:\Users\Admin\AppData\Local\Temp\6ce14f6d74a647ad130553b96883b19d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    PID:4972

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsc7292.tmp\InstallOptions.dll

          Filesize

          14KB

          MD5

          0dc0cc7a6d9db685bf05a7e5f3ea4781

          SHA1

          5d8b6268eeec9d8d904bc9d988a4b588b392213f

          SHA256

          8e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c

          SHA512

          814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0

        • C:\Users\Admin\AppData\Local\Temp\nsc7292.tmp\KillProcDLL.dll

          Filesize

          4KB

          MD5

          99f345cf51b6c3c317d20a81acb11012

          SHA1

          b3d0355f527c536ea14a8ff51741c8739d66f727

          SHA256

          c2689ba1f66066afce85ca6457ecd36370be0fe351c58422e45efd0948655c93

          SHA512

          937aa75be84a74f2be3b54dc80fac02c17dad1915d924ef82ab354d2a49bc773ee6d801203c52686113783a7c7ea0e8ed8e673ba696d6d3212f7006e291ed2ef

        • C:\Users\Admin\AppData\Local\Temp\nsc7292.tmp\ioSpecial.ini

          Filesize

          626B

          MD5

          50a60a9d8faa53e9cf5f9074e391ef7f

          SHA1

          a537ce3bf78376232f346e5491c46685979fb8a7

          SHA256

          f12aab986639e4f0f360038038fcc06625de9938a8b7b6bac1d264d3e82e911d

          SHA512

          32a54b3db8e7d87d0d8562479f0860a2b8b3a9c6213f23857e259cabc9bd6250a75c2e4b8470358faffbf8961aa9cde8b76a7e5a1999fdbee2a7534f312575fa

        • C:\Users\Admin\AppData\Local\Temp\nsc7292.tmp\ioSpecial.ini

          Filesize

          665B

          MD5

          5938431c4ee241c5eb91286ae1f149bc

          SHA1

          1f26b9b8f9c6ec51b090709d6c169d45e3ac5730

          SHA256

          c04840440fb8111f2ee2e9cfc16c3c7584c91433849bd2156e2f47ed7b922f69

          SHA512

          7bb473d8ceb430a47a4a72c13ba5655d1d6fec622573789ef64d179bcd9340195f7faaa011d02db7fa81b855b9522326388884fafc62b6af4afc7a48a416a03a

        • memory/4972-27-0x0000000010000000-0x0000000010003000-memory.dmp

          Filesize

          12KB

        • memory/4972-28-0x0000000010000000-0x0000000010003000-memory.dmp

          Filesize

          12KB

        • memory/4972-29-0x0000000010000000-0x0000000010003000-memory.dmp

          Filesize

          12KB

        • memory/4972-30-0x0000000010000000-0x0000000010003000-memory.dmp

          Filesize

          12KB