Analysis

  • max time kernel
    134s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 21:33

General

  • Target

    0489337d099cb964d642ba93815af67a.exe

  • Size

    65KB

  • MD5

    0489337d099cb964d642ba93815af67a

  • SHA1

    dea0bd0c0745d1fd7176dd4bb28cd5c13c939916

  • SHA256

    a14ab005ed46776c00535712c7ccc91991ab0537aec55df665ac67065db5c74c

  • SHA512

    e9cc2063f0f4f1bad5b1ba157b5e90ce159fc7bc488afd7a1fd61d4e6d191c994f4bb5a5a1ddb232150d5851e086183c1d998f1f179534d6e3c7b131d914618b

  • SSDEEP

    1536:ip5vzAnFzVBO3XvJjxozesUxJk5p5xMSTlTM:ip5vgJknhKyVJk5p5xM2M

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0489337d099cb964d642ba93815af67a.exe
    "C:\Users\Admin\AppData\Local\Temp\0489337d099cb964d642ba93815af67a.exe"
    1⤵
    • Drops file in Drivers directory
    • Sets DLL path for service in the registry
    • Loads dropped DLL
    • Drops file in System32 directory
    PID:2192
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k mpdqvu
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\uojlze.dll

    Filesize

    91KB

    MD5

    b449a55c0ec27d5c1d4058b501ac9423

    SHA1

    ccee4fe09a171e7a888424520a74d6d770459c74

    SHA256

    184143a9196e45d699cc1ec4ae6283ac5ecf0aec549dffa2c48d69be90afe944

    SHA512

    12a0b8fdb86d79a172ae691986a937c961523d0b606e143879bf84c067a537d345825163514618c584d82dbb64ebe4c3c9507a818e94337204d2cdcec64602cf

  • memory/2192-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2192-6-0x0000000010000000-0x000000001001B000-memory.dmp

    Filesize

    108KB

  • memory/2192-9-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2968-10-0x0000000010000000-0x000000001001B000-memory.dmp

    Filesize

    108KB