Analysis

  • max time kernel
    158s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 07:56

General

  • Target

    12bee5a0f409509a09d5042769cea45e.exe

  • Size

    960KB

  • MD5

    12bee5a0f409509a09d5042769cea45e

  • SHA1

    d49b0e3551f5602389294170768344a07ca7771b

  • SHA256

    e3b3f42cc2a24dd62ee89245d50dd815c87b033b45f402ec36e751b3b7b3288b

  • SHA512

    016391a9bb084857f770b23d088796e2cd08e27e52b162e0e7f7b479f0ecaa20ef72980848824d1ac6f6341a75c1628c8f2ac68fccb29d6b5f6d6aca09cbcfe1

  • SSDEEP

    12288:X6Wq4aaE6KwyF5L0Y2D1PqLb6Wq4aaE6KwyF5L0Y2D1PqLx6Wq4aaE6KwyF5L0YJ:1thEVaPqLBthEVaPqLHthEVaPqLTthX

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12bee5a0f409509a09d5042769cea45e.exe
    "C:\Users\Admin\AppData\Local\Temp\12bee5a0f409509a09d5042769cea45e.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\svhost.exe
      C:\Windows\svhost.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2296

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Documents and Settings.exe

          Filesize

          960KB

          MD5

          0c4db98b60b5cadc4103afc07797f549

          SHA1

          80f75f7b040b2c4b4f09efa5f492f40c5d7a336f

          SHA256

          759df47e90da28bea6545236403d5a7da5a2aee207088ae4dc46df0ca75f25b0

          SHA512

          b9b96b06ddc57dad573650c14d69f3030c1770c071d2ae0ca751145c966e517f3c6e71a65ef01540e95d46eb332c3fe42353eaa793c966fb166bc70512928ca7

        • C:\Windows\Driver.db

          Filesize

          82B

          MD5

          c2d2dc50dca8a2bfdc8e2d59dfa5796d

          SHA1

          7a6150fc53244e28d1bcea437c0c9d276c41ccad

          SHA256

          b2d38b3f122cfcf3cecabf0dfe2ab9c4182416d6961ae43f1eebee489cf3c960

          SHA512

          6cfdd08729de9ee9d1f5d8fcd859144d32ddc0a9e7074202a7d03d3795bdf0027a074a6aa54f451d4166024c134b27c55c7142170e64d979d86c13801f937ce4

        • C:\Windows\svhost.exe

          Filesize

          960KB

          MD5

          30405ec00e729d80e566264102a99960

          SHA1

          1a04fd4a5bbac0bea1f94066e96f5c8d538073cf

          SHA256

          5c3993d9215d63752ff0c39a1c84f6a3cc1bd31a11a83ec3cb639abfc0c16a58

          SHA512

          968fd1b06ae5118b81fc1bf9f2c170b457d84b9d81b614ac132a4388fdef764f7d9ef0899b489d1313eea9f47c518ad49c26cd2a84b50e165af7e0e9f3fb16b1

        • memory/2232-0-0x0000000000400000-0x0000000000523000-memory.dmp

          Filesize

          1.1MB

        • memory/2232-498-0x0000000000400000-0x0000000000523000-memory.dmp

          Filesize

          1.1MB

        • memory/2232-507-0x0000000003930000-0x0000000003A53000-memory.dmp

          Filesize

          1.1MB

        • memory/2296-2616-0x0000000000400000-0x0000000000523000-memory.dmp

          Filesize

          1.1MB