Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2023 02:27

General

  • Target

    b6ef43a0d463f59ded49449cae2c9988.exe

  • Size

    307KB

  • MD5

    b6ef43a0d463f59ded49449cae2c9988

  • SHA1

    70f17404e8b05df854a283d09d0e95818ce4e7fe

  • SHA256

    47041d64da308764d5459db700e096a05cfc81a738327c00c8d9ec12e9a05d2e

  • SHA512

    005a4c53513dfecf658a4b851be5643ca21e98b05bbbfe66a5d6dffc52ab345d0e19aa020ef6ff5f15e26769403534c7bf62e895060fc2eafa38c36e1ce58039

  • SSDEEP

    6144:6iIIf6w1xsVedL1k18zbXURNq7ffgo5m1ms/l2KRJZRp7eZk5:6iIICY0ed/bX0NqEo5Ams/sKTrCk5

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6ef43a0d463f59ded49449cae2c9988.exe
    "C:\Users\Admin\AppData\Local\Temp\b6ef43a0d463f59ded49449cae2c9988.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\ProgramData\043A6A5B00014973000AFC62B4EB2331\043A6A5B00014973000AFC62B4EB2331.exe
      "C:\ProgramData\043A6A5B00014973000AFC62B4EB2331\043A6A5B00014973000AFC62B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\b6ef43a0d463f59ded49449cae2c9988.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\043A6A5B00014973000AFC62B4EB2331\043A6A5B00014973000AFC62B4EB2331.exe

    Filesize

    307KB

    MD5

    b6ef43a0d463f59ded49449cae2c9988

    SHA1

    70f17404e8b05df854a283d09d0e95818ce4e7fe

    SHA256

    47041d64da308764d5459db700e096a05cfc81a738327c00c8d9ec12e9a05d2e

    SHA512

    005a4c53513dfecf658a4b851be5643ca21e98b05bbbfe66a5d6dffc52ab345d0e19aa020ef6ff5f15e26769403534c7bf62e895060fc2eafa38c36e1ce58039

  • memory/2364-1-0x0000000000270000-0x0000000000272000-memory.dmp

    Filesize

    8KB

  • memory/2364-0-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2364-2-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2364-11-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2592-12-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2592-13-0x0000000000260000-0x0000000000262000-memory.dmp

    Filesize

    8KB

  • memory/2592-20-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2592-32-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB