Analysis

  • max time kernel
    0s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 12:59

General

  • Target

    1946f2361b66efcb51df0b8609711e6e.exe

  • Size

    43KB

  • MD5

    1946f2361b66efcb51df0b8609711e6e

  • SHA1

    7ce4db08f2623f8b7a72b2ffba1f50e3d30b30ef

  • SHA256

    f13b1c674c766083cba391e399ce76131e2dddb7930fa2df198ef6a17aca6c17

  • SHA512

    793b2f5c5ec12330fcf76143c515cdb1530dea95defdb6e91ca133ba3874dea9a7b1ab70cebc2e3b78709615927da407274aec15cd32e5b9729e42dad69cd10b

  • SSDEEP

    768:pmLnEO9JZnaigm8/8IIqaMlN2EHYf/Fj9XTQ224+:pmfjZnf0nMfkY3h9U227

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:275457 /prefetch:2
    1⤵
      PID:2624
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -embedding
      1⤵
        PID:2608
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c start iexplore -embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3064
      • C:\Users\Admin\AppData\Local\Temp\1946f2361b66efcb51df0b8609711e6e.exe
        "C:\Users\Admin\AppData\Local\Temp\1946f2361b66efcb51df0b8609711e6e.exe"
        1⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:3000
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Local\Temp\1946f2361b66efcb51df0b8609711e6e.bat"
          2⤵
            PID:2464
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c "C:\Users\Admin\AppData\Local\Temp\twe62E8.bat"
            2⤵
              PID:2604

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads