Analysis

  • max time kernel
    148s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/12/2023, 21:01

General

  • Target

    f7ee5682e7a19e99552ba146a3fa4da8.exe

  • Size

    88KB

  • MD5

    f7ee5682e7a19e99552ba146a3fa4da8

  • SHA1

    4c7bf218f8d919c03f27dd8fb6971194645f10da

  • SHA256

    8dfeff8f36284fe139b4bc6fed3e66006d41574fc684230a10d9d6bc93dc20bd

  • SHA512

    436a1e3400c4e5fa7968d12d0df2da21937e6fe69d22ca5001e4c72b45ee9c669a1952351cce020930383436b31c432ab1aabdc59b777d4f6e191b3f211393bc

  • SSDEEP

    1536:IAVDyvSFEU6crB2sHrT16bs0Hd1Q9vSBvHEU66lDyv:R1rBxHrT1Es0Hd1ivSBvH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7ee5682e7a19e99552ba146a3fa4da8.exe
    "C:\Users\Admin\AppData\Local\Temp\f7ee5682e7a19e99552ba146a3fa4da8.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c cd /d C:\Users\Admin\AppData\Local\Temp&del /q *.vbe
      2⤵
        PID:2804

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2824-2-0x00000000044D0000-0x0000000005532000-memory.dmp

      Filesize

      16.4MB