Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28/12/2023, 22:22

General

  • Target

    fc821610eefe4ef341e645ee232b99d1.exe

  • Size

    44KB

  • MD5

    fc821610eefe4ef341e645ee232b99d1

  • SHA1

    6807226c73f80eaecfe3af69ea946c58a6e168de

  • SHA256

    81864cbd415a37f260aae2ecefc1f919aae37aa0d2d906fc5ab5f63bbef788f1

  • SHA512

    374670c76464f62cba3d6a312e34310a29f0d4bc10a295fba0b4c267a15a0297a17419844b610f6a292d9dd91c91c818b44fef22a89386d29db349a4b2859503

  • SSDEEP

    768:1vopAPmXWUeXkN3Zg3OXKnHSG69Enlne0C2udLUeJs3Q:dJsTDdWnrrz3Q

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 46 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc821610eefe4ef341e645ee232b99d1.exe
    "C:\Users\Admin\AppData\Local\Temp\fc821610eefe4ef341e645ee232b99d1.exe"
    1⤵
    • Sets service image path in registry
    • Drops file in Windows directory
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 "C:\Windows\Downloaded Program Files\ThunderAdvise.dll",MainProc
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2084
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\\uninstall.bat"
      2⤵
      • Deletes itself
      PID:1132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\uninstall.bat

    Filesize

    231B

    MD5

    5bf5a4b1e8a6d7b9133d09f3fcd63de0

    SHA1

    90a9f90bec6193b140bfbb7612285ce0b875264e

    SHA256

    552794b8b5fe929f0ec94cc611fbd69f3b5c27163ec480b4465aba4d0ae82977

    SHA512

    1be7c58dc6350e46e97205c36f8905e1b6973f383f038fe8b301eab5b59d379845396814da1bab2aa9d16aa894bd60ec6fcb964f50cca14bf3d73f2b4e87a07c

  • \Windows\Downloaded Program Files\ThunderAdvise.dll

    Filesize

    44KB

    MD5

    03f78e67da84f5ca0f8f96003758e921

    SHA1

    14ad4beead2f87685ccfdc90856ed755bd0ae7cd

    SHA256

    5f3c9450385956583df4c4194601ad2bbc885325fb08508e629adf455899bf15

    SHA512

    58b626c6b2f6a921131770d5877a9d127ec39d960e08cae85ec8fa895874a5315ab7a018e2786d6b7a8af6aac67a46a3d938dc737445d99e4ce7a514cc7a561e