Analysis

  • max time kernel
    145s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 14:48

General

  • Target

    76c6da251ff5517901c3543871c8502e.exe

  • Size

    396KB

  • MD5

    76c6da251ff5517901c3543871c8502e

  • SHA1

    5de99cf850716fad4072bfecd15a0de0f17deff1

  • SHA256

    5579ebe855d9b02826592a82d4ec627b41af3e6d43caada442b240424c4c0804

  • SHA512

    d63cf288a2e62cb726e7c7202d0d2e2262ff9440669a0421f43e100826e69c55bc758349e23f9ddaa0efeb3d9b7f4f7fff3ca490e2286d16832037221a57fc59

  • SSDEEP

    6144:v4yp6NVyX7Mq28roVnDtdI1o3hwz9yD38HseQtR29Q/vCRJN:vG0rN28rohs1o3hy9sgZ

Malware Config

Signatures

  • Windows security bypass 2 TTPs 10 IoCs
  • Disables taskbar notifications via registry modification
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 14 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\ProgramData\043A6A5B00014973000C0C69B4EB2331\043A6A5B00014973000C0C69B4EB2331.exe
    "C:\ProgramData\043A6A5B00014973000C0C69B4EB2331\043A6A5B00014973000C0C69B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\76c6da251ff5517901c3543871c8502e.exe"
    1⤵
    • Windows security bypass
    • Deletes itself
    • Executes dropped EXE
    • Windows security modification
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2324
  • C:\Users\Admin\AppData\Local\Temp\76c6da251ff5517901c3543871c8502e.exe
    "C:\Users\Admin\AppData\Local\Temp\76c6da251ff5517901c3543871c8502e.exe"
    1⤵
    • Windows security bypass
    • Loads dropped DLL
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\043A6A5B00014973000C0C69B4EB2331\043A6A5B00014973000C0C69B4EB2331.exe

    Filesize

    96KB

    MD5

    78bf1a00e9bae3556be0dd5fb6371e62

    SHA1

    d7b55f6637d68d7711d45ad859d8238a37638d84

    SHA256

    d3a6f3632d00af6713bb01e93df798c7f786d77aec4e031811f787d8bbbc69c3

    SHA512

    b05e1e7f8a1332f72ec322e23fa1b6d3bdfa8038e4b46fd67d82cb4db8d81d5e108c0e82b98459ca26b68f7a42db8685cfe5b8fd620298abb6be3613b0d2cd5a

  • C:\ProgramData\043A6A5B00014973000C0C69B4EB2331\043A6A5B00014973000C0C69B4EB2331.exe

    Filesize

    348KB

    MD5

    e4ad5789ac15fb58841a90550f7d550a

    SHA1

    a399b170d389b34329e575403c8e5397c03aeb3c

    SHA256

    07d00c799ecf0fcdeecf682fd444f347b2fb2f34afec87d6ab38f65f347d881a

    SHA512

    60e9498666c0122a3d938ee63deb7c6bab1b584eebaacf99591078fbd4a467b977a1f74e2a0ede71912cf12746c062405d2ce929938f9740e171a61b1c1fdc47

  • \ProgramData\043A6A5B00014973000C0C69B4EB2331\043A6A5B00014973000C0C69B4EB2331.exe

    Filesize

    396KB

    MD5

    76c6da251ff5517901c3543871c8502e

    SHA1

    5de99cf850716fad4072bfecd15a0de0f17deff1

    SHA256

    5579ebe855d9b02826592a82d4ec627b41af3e6d43caada442b240424c4c0804

    SHA512

    d63cf288a2e62cb726e7c7202d0d2e2262ff9440669a0421f43e100826e69c55bc758349e23f9ddaa0efeb3d9b7f4f7fff3ca490e2286d16832037221a57fc59

  • memory/2228-1-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2228-2-0x0000000000230000-0x0000000000232000-memory.dmp

    Filesize

    8KB

  • memory/2228-0-0x0000000000220000-0x0000000000224000-memory.dmp

    Filesize

    16KB

  • memory/2228-20-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2228-27-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2324-12-0x0000000000240000-0x0000000000242000-memory.dmp

    Filesize

    8KB

  • memory/2324-11-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2324-21-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2324-30-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2324-36-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB