Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 21:33

General

  • Target

    1d1f0cc55c1934cb95173814c14a21d5.exe

  • Size

    456KB

  • MD5

    1d1f0cc55c1934cb95173814c14a21d5

  • SHA1

    8ec40782553dc46ba6bed9302a276f1449e5f4d3

  • SHA256

    e12065c75e29bcd1f5a95849ecffa1d4463ee48b21415a32b45cccd80d14be36

  • SHA512

    98a996a73c783291282a1c89da7ddcdf299ee000e605b998bec3b67bed093a1efc7b2364c06b4ca0197dea4409405cefdd560e78312f7e66a05cfbc2b88b1bb8

  • SSDEEP

    12288:oely6pWtDJWRjPmhZicFCtbZX65wBJy1R/0ZSnvDygsI6yE:ofmWHccZicFCloKbyn0E/sIu

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d1f0cc55c1934cb95173814c14a21d5.exe
    "C:\Users\Admin\AppData\Local\Temp\1d1f0cc55c1934cb95173814c14a21d5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\ProgramData\cN01804FnJjF01804\cN01804FnJjF01804.exe
      "C:\ProgramData\cN01804FnJjF01804\cN01804FnJjF01804.exe" "C:\Users\Admin\AppData\Local\Temp\1d1f0cc55c1934cb95173814c14a21d5.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\cN01804FnJjF01804\cN01804FnJjF01804

    Filesize

    192B

    MD5

    8432c3361182384705c82c4dc1ada409

    SHA1

    7ace8a0706e0e680af93d9cb25e4232f0c7b1446

    SHA256

    73214392c9ee2508e51b43d30a48c5041cb7c70a2070cf41c85a8df9bf4f77ab

    SHA512

    c27264dc5c4b66fadcce645b660e89baec3f84e44e43f2fa2ffa4ca542270e3d969f6ae2d5f9e90f9a7a901d96607a869916f32b2e8fac9aa0cde1a027ad80d8

  • \ProgramData\cN01804FnJjF01804\cN01804FnJjF01804.exe

    Filesize

    456KB

    MD5

    d98db5d77a14cb2e798567849ac65bc1

    SHA1

    43451c5a0129745ec5156d2adb67a8329cdcf7d1

    SHA256

    1f56be2e9166464fff6c955afb8e08ea7cd2bf3c77442248769d2f498d422b50

    SHA512

    ba943512cc6f6e9132459db1954590c38ed7f566e16af6069ecacafefc6439f994b24aac11e9f4cd79aa58de65b349e78add71642e1f00c01021bbdefb0d2ada

  • memory/2880-1-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2880-2-0x0000000000630000-0x0000000000730000-memory.dmp

    Filesize

    1024KB

  • memory/2880-17-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2888-20-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2888-21-0x00000000002E0000-0x00000000003E0000-memory.dmp

    Filesize

    1024KB

  • memory/2888-30-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/2888-32-0x00000000002E0000-0x00000000003E0000-memory.dmp

    Filesize

    1024KB

  • memory/2888-40-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB