Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 22:21

General

  • Target

    HOTFIX/KB832483.exe

  • Size

    2.0MB

  • MD5

    b4060134ceff0f35fac0ef0968558950

  • SHA1

    6f348d3e603d0aa2d84429c69be1698a0d2a6b7b

  • SHA256

    ae810df56535e49c3716df0ac7f8b303e9810b6b90802f6732422e724fa69a23

  • SHA512

    4a9d66e26a4330b0c460d78fa90986837a5f228f9861f398c691c3abdc5806420465cd00b6e0ec652793c77bcc552db7178f19f6e2c71b783768536798abcead

  • SSDEEP

    49152:kJj4LNeJQlHrkUXC1m+9d+7rikF31/KcvpjJ0TOSFNesTA+W73v4M:SUoWL1Spd+39sTRNf1S4M

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HOTFIX\KB832483.exe
    "C:\Users\Admin\AppData\Local\Temp\HOTFIX\KB832483.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dahotfix.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dahotfix.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dahotfix.exe

    Filesize

    119KB

    MD5

    6da333113835598bd7e8cacbdf06dac5

    SHA1

    4517f066f8cf077f1a5726710ebb194e31b2292e

    SHA256

    c9a931fa58c8a7557ad8495147977e120799b287143144791e9c8b6d611e70a4

    SHA512

    4c5f3c0a621b1b4e9076a93f7d969288010f701dd34e2d5c47de2c7827cae7f1474c7a680ee82dad676cb9198dec5dd58ed6bee05d40ed56ec516f2338a13387

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dahotfix.ini

    Filesize

    24KB

    MD5

    ffcabe82612af7554019d409bf6e6e0e

    SHA1

    aa757a5488e16d7c85911b54e41c4513708a8607

    SHA256

    9d41b83ce2c47d403ac495456005371dfe9aeced7bfca819881c82041a1f906b

    SHA512

    92b9963ddeb6a29ddffefec03916733f8da99a4de00a3a18055dbadbfa192794c9e5336398af8bc602590e0399a54b655c1257aea2551d2394ade2c861799f0f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\odbcbcp_253.dll

    Filesize

    24KB

    MD5

    a1825b549b53699b5f79d6304a7b1cec

    SHA1

    ad440122e403969305f9bf45b4cb8058b4a83ed2

    SHA256

    06636809ed6915b791ad9ef2988deaddcca3a01ce7e87a0f6034bd8377f54953

    SHA512

    73dd397a688c93b453b7c8ec68f2da2b997e6ea4bf64838d05fcecac7eb7d3f9ee19afcd7295330dbe489e4de247099182a9cdf4d96d08d9dfee2a80299f270f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sqlsrv32_253.dll

    Filesize

    290KB

    MD5

    2f3b470c94f853f9c78d56efa0d8bad8

    SHA1

    3c9349b6c7a5366bfc905e52ba183b5c7737b99a

    SHA256

    95b2bd188e6b0ff448800aba3d23f6c08c4ed02cd45c14128f7bd495fc52883e

    SHA512

    392a3c80a30d4d7d075551a7915b0ef68c4b125ec3d91e34526c4b369f9111609fb6d2b003391a96ef4ed6bc9eed9cc701b3dbbc4a8a48abf2ceb4c286088018