Analysis

  • max time kernel
    146s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 02:05

General

  • Target

    0b116dda8179536994b0371e242ecc77.exe

  • Size

    2.5MB

  • MD5

    0b116dda8179536994b0371e242ecc77

  • SHA1

    92fa9c43b2b2afc18f4b70d2bc38debb84e3b751

  • SHA256

    a0a86a3fd6bdd571d9185c51fcea853ca32837b46fe89eae17817851d52a6a07

  • SHA512

    12f7d7e2984d7fe16f80a9da9633bffc94c7fc48057c1fcee9bf41a7bfe7fa0af1dd5122f3f322292029c3fbfc4f10c4c257e860753b411279b14744ebd67001

  • SSDEEP

    49152:dzSNRPLHkJEz92takOElMaFLkAu5HOTbv9Md9VfWB:cTDPUak72Hu9U9Fa

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b116dda8179536994b0371e242ecc77.exe
    "C:\Users\Admin\AppData\Local\Temp\0b116dda8179536994b0371e242ecc77.exe"
    1⤵
    • Adds Run key to start application
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    PID:4068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\905c0769f9a06c95a24ddf945\patcher.exe$

    Filesize

    2.2MB

    MD5

    9875dd70707d1f903c0c526964a14410

    SHA1

    28711f82331f101e609e26c6519736ee7ee916cf

    SHA256

    3b4dc70479e8adf15e70d6c6bf46acf781253d8b4f7a9a30b1c4b374bc643962

    SHA512

    53a50ee95825759c543b5b49c04ba5ae4b629ace35f02c77e6ca098de4cda9ffc132fb2c57f46013ca87d8b8155bcc7cc5f29f3e8fefcf4a6b1e66b0e9c6bb00

  • memory/4068-1-0x00000000007C0000-0x00000000007C2000-memory.dmp

    Filesize

    8KB

  • memory/4068-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4068-35-0x00000000007C0000-0x00000000007C2000-memory.dmp

    Filesize

    8KB