Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 21:16

General

  • Target

    043762e33620e3efe7fb724cec718bbf.exe

  • Size

    758KB

  • MD5

    043762e33620e3efe7fb724cec718bbf

  • SHA1

    7f1dd3de753dbf8cc7cc6f0ed2c5e43b29ed591c

  • SHA256

    dd1c84cabb03b940ed1069c924645c5c9b805c9816ea44b3f875bff97b8ddee8

  • SHA512

    aa4451458890c3b12ae16ef14b698ed2f764d10d2a19936cb5f0e52c299ebb8f6d8ff14349024c6142ac16ced29f81bc586c2c00abb6e26c05cf0298b55c37c9

  • SSDEEP

    12288:khXY7deYolDRfhT93VgcSRY5UcW5x7KzUo0/zRvSLyut4uVv:khXqgYMDRfhx2kTWb7fxc4uB

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\043762e33620e3efe7fb724cec718bbf.exe
    "C:\Users\Admin\AppData\Local\Temp\043762e33620e3efe7fb724cec718bbf.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\E_N4\HtmlView.fne

    Filesize

    212KB

    MD5

    4c9e8f81bf741a61915d0d4fc49d595e

    SHA1

    d033008b3a0e5d3fc8876e0423ee5509ecb3897c

    SHA256

    951d725f4a12cd4ff713ca147fa3be08a02367db6731283c3f1ba30445990129

    SHA512

    cf2c6f8f471c8a5aad563bc257035515860689b73ce343599c7713de8bc8338a031a722f366e005bc1907d6fc97b68b8b415e8ff05b7324fb1040c5dc02315d7

  • \Users\Admin\AppData\Local\Temp\E_N4\WebBrowser2.fne

    Filesize

    244KB

    MD5

    58573357ee1781c12923b83750b80fb6

    SHA1

    0ed04679def908617e681dc5f1735b0d9b029089

    SHA256

    5338dfb53de32b1c9c5b1dcdbc0e8fe2431679e86248b19ce36b6fa1e56f5e6a

    SHA512

    ec7c68b52d15e75c447b14799ad4e3105644ed502d6014b414a254eb2309117527ffaf5ed030b6cb42f5e3e8acb866e16509e2bf16b463361a9e364a50d27d00

  • \Users\Admin\AppData\Local\Temp\E_N4\krnln.fnr

    Filesize

    1.1MB

    MD5

    638e737b2293cf7b1f14c0b4fb1f3289

    SHA1

    f8e2223348433b992a8c42c4a7a9fb4b5c1158bc

    SHA256

    baad4798c3ab24dec8f0ac3cde48e2fee2e2dffa60d2b2497cd295cd6319fd5b

    SHA512

    4d714a0980238c49af10376ff26ec9e6415e7057925b32ec1c24780c3671047ac5b5670e46c1c6cf9f160519be8f37e1e57f05c30c6c4bda3b275b143aa0bf12

  • memory/2300-0-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2300-7-0x0000000001CB0000-0x0000000001CE8000-memory.dmp

    Filesize

    224KB

  • memory/2300-11-0x0000000003E80000-0x0000000003EC1000-memory.dmp

    Filesize

    260KB

  • memory/2300-22-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB