Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 10:50

General

  • Target

    166a8373323e862687504f95022337ba.exe

  • Size

    128KB

  • MD5

    166a8373323e862687504f95022337ba

  • SHA1

    a9b3da14668d9015026227f14974af09ecf4cc4e

  • SHA256

    d96d7a605332733be0fcbbc69574d9018c10de1fbb429270f28899dff8430836

  • SHA512

    14659f5a27ffd2c3016b7a84a35b5fc1c76c1cd8720a424cec6646afe4d99b741da2437d0c9cceb3e0d4c01a9794d2a54cbed58ce08822e9780bde0a78efa7f0

  • SSDEEP

    3072:EmeDmBqskJ8bX/v44oVHVA9VS6TpCyA5GFevgY8qlK:E8P/w4GHW9VS6TpCy8GFggUK

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\166a8373323e862687504f95022337ba.exe
    "C:\Users\Admin\AppData\Local\Temp\166a8373323e862687504f95022337ba.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Common Files\PushWare\cpush.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1748

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads