Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 00:37

General

  • Target

    08bd4705a3a800d596be1e5549461b45.exe

  • Size

    100KB

  • MD5

    08bd4705a3a800d596be1e5549461b45

  • SHA1

    271efba5f0b1e886f2d85244adcf4b98fdbd212d

  • SHA256

    29d05c57e510d92a9fe36829406ffdec1be9e40cb0d953744648496ce1881341

  • SHA512

    622ef7e6893319c4b6a0b49aa93cdcdda80eeca26919965516cb8bf9566335fab3ee21c6ae9728626ada42b9795eae0291037fa1000fb769827498bee13d97ab

  • SSDEEP

    1536:mmt0/82NTdwqLGZcYADZPU1+73BD88b0nysNIjnZq:Ww9gZPUQJsCnY

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08bd4705a3a800d596be1e5549461b45.exe
    "C:\Users\Admin\AppData\Local\Temp\08bd4705a3a800d596be1e5549461b45.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\hoahi.exe
      "C:\Users\Admin\hoahi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\hoahi.exe

    Filesize

    100KB

    MD5

    cd4a351e33eca4bb6dc64d7b26f54795

    SHA1

    f93aadff9fdb27019af1faf1352662ce2239911f

    SHA256

    e361a2c994a66d28a3936ad2b46aa7eedd5c431a4bd09c28f9041bfb5e157380

    SHA512

    1353eca54079a23480500aa4d9c5328b28fed1af261565c6b89835a5a50003d806e090a733089f7aab33e1fd051acca1f6d202e110b0ad4baac451654e11f954

  • \Users\Admin\hoahi.exe

    Filesize

    92KB

    MD5

    85acba89111700f7d171f782ba094e15

    SHA1

    1754bdadb21181a95908dba013c576eb7e2a660a

    SHA256

    cbe39de2fdff2c0e36b3693246c3e5cd86e383f06d7bd7a25adc4e768ded9eeb

    SHA512

    5ba55d48ef5aa521ae82b574f454ea0061f5e8b002e9e7b9d878d51436b2d8ca12270274c1c96f76bb096e8724ce2650fc36904125183492e786ee7fafdec9da