Analysis

  • max time kernel
    37s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 03:51

General

  • Target

    0d805460dbde9cac7783fb46a7a5b4df.exe

  • Size

    206KB

  • MD5

    0d805460dbde9cac7783fb46a7a5b4df

  • SHA1

    f048583dc9152fc936ed353c81df3b8551bfe1b6

  • SHA256

    1bdf0fc891b8611431f40a71e42a0cec796d9db12d0f0d8cb47459f39e997c49

  • SHA512

    8bc4fe25ef93c5621a3d82f51fb9e5ed14d0d73a9a9401db9b0be13e4fa32d718dd8ca819dfe1e244f30537a09510d7db2875912c66d831f4ed8b6d97df4d966

  • SSDEEP

    3072:qXg49H0gEaPAllP81Oj5uWoS/8GYo/eLUmypwjmhFOAf+XG7gwr6+pVNsa/oiXCS:qXb0haUlXeBhUdpwjmrOAfp/6OYcuS

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Loads dropped DLL 1 IoCs
  • Modifies WinLogon 2 TTPs 8 IoCs
  • Drops file in System32 directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1372
      • C:\Users\Admin\AppData\Local\Temp\0d805460dbde9cac7783fb46a7a5b4df.exe
        "C:\Users\Admin\AppData\Local\Temp\0d805460dbde9cac7783fb46a7a5b4df.exe"
        2⤵
        • Loads dropped DLL
        • Modifies WinLogon
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2936
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" about:blank
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2664
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2664 CREDAT:275457 /prefetch:2
      1⤵
        PID:2460

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1372-1-0x0000000002A10000-0x0000000002A11000-memory.dmp

        Filesize

        4KB