Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 22:21

General

  • Target

    HOTFIX/KB832483.exe

  • Size

    2.0MB

  • MD5

    b4060134ceff0f35fac0ef0968558950

  • SHA1

    6f348d3e603d0aa2d84429c69be1698a0d2a6b7b

  • SHA256

    ae810df56535e49c3716df0ac7f8b303e9810b6b90802f6732422e724fa69a23

  • SHA512

    4a9d66e26a4330b0c460d78fa90986837a5f228f9861f398c691c3abdc5806420465cd00b6e0ec652793c77bcc552db7178f19f6e2c71b783768536798abcead

  • SSDEEP

    49152:kJj4LNeJQlHrkUXC1m+9d+7rikF31/KcvpjJ0TOSFNesTA+W73v4M:SUoWL1Spd+39sTRNf1S4M

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HOTFIX\KB832483.exe
    "C:\Users\Admin\AppData\Local\Temp\HOTFIX\KB832483.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dahotfix.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dahotfix.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dahotfix.ini

    Filesize

    24KB

    MD5

    ffcabe82612af7554019d409bf6e6e0e

    SHA1

    aa757a5488e16d7c85911b54e41c4513708a8607

    SHA256

    9d41b83ce2c47d403ac495456005371dfe9aeced7bfca819881c82041a1f906b

    SHA512

    92b9963ddeb6a29ddffefec03916733f8da99a4de00a3a18055dbadbfa192794c9e5336398af8bc602590e0399a54b655c1257aea2551d2394ade2c861799f0f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\odbcbcp_253.dll

    Filesize

    24KB

    MD5

    a1825b549b53699b5f79d6304a7b1cec

    SHA1

    ad440122e403969305f9bf45b4cb8058b4a83ed2

    SHA256

    06636809ed6915b791ad9ef2988deaddcca3a01ce7e87a0f6034bd8377f54953

    SHA512

    73dd397a688c93b453b7c8ec68f2da2b997e6ea4bf64838d05fcecac7eb7d3f9ee19afcd7295330dbe489e4de247099182a9cdf4d96d08d9dfee2a80299f270f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sqlsrv32_253.dll

    Filesize

    512KB

    MD5

    b0f2b24c1c1e0d0a4bfc78006981606f

    SHA1

    a6f649c5308514d827206fae386a17a08dd8c592

    SHA256

    f028acac40d8d00b710287a8297eeaa6cf97c11dd7d011531a6ba370223f70c0

    SHA512

    8aefed3a57b06cfbe96e14f3589077487897c11407ad60ce59dcf35f3a84ba656d800a15f4c5af6d60e2e15cab5f06e55b0fe64e0c237843ec25931f6798fa02

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\dahotfix.exe

    Filesize

    119KB

    MD5

    6da333113835598bd7e8cacbdf06dac5

    SHA1

    4517f066f8cf077f1a5726710ebb194e31b2292e

    SHA256

    c9a931fa58c8a7557ad8495147977e120799b287143144791e9c8b6d611e70a4

    SHA512

    4c5f3c0a621b1b4e9076a93f7d969288010f701dd34e2d5c47de2c7827cae7f1474c7a680ee82dad676cb9198dec5dd58ed6bee05d40ed56ec516f2338a13387