Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 13:32

General

  • Target

    1a204aea28908b5230ae51c6fbff9ec0.exe

  • Size

    23.2MB

  • MD5

    1a204aea28908b5230ae51c6fbff9ec0

  • SHA1

    71db4e02f6ada852a1a71ef12e48b68dde1e9059

  • SHA256

    9b3992193d3661c3605576230693556cb76e202be8d084e5a0548b328ee7afef

  • SHA512

    485dbdf95e82b20b7d17cc0f04fd9525afe96a5690284f5daf36e68f362643897da5d43549f9d2f7f6324d4072760df3e6a03afa3920036dc4ac26d2178d2195

  • SSDEEP

    393216:QwYa5spFeIwDDyMTtOe7cdaYnfeOD4AmJONvTo3ofrzRUt3f9SNu8q84:QW5fIwjtOnwCeOoi8YTzRfNxT4

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a204aea28908b5230ae51c6fbff9ec0.exe
    "C:\Users\Admin\AppData\Local\Temp\1a204aea28908b5230ae51c6fbff9ec0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:532

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nst39E6.tmp\ioSpecial.ini

          Filesize

          831B

          MD5

          0c76867f914793dc6f8cc530e7b82c6f

          SHA1

          dd33309710f8768f8239f15fc52122cf41f73e80

          SHA256

          d49a6acdbc96db68a56c37367a613892c61a9ae9e921caf4c033db4a15ed9637

          SHA512

          9c312eedc2cfb3632887841a8cb2760e154e1511d568c8b0cbef681e05dc05c74c04b3f1a048bc2249688b92afd5a1690aa69fd12b2f43033973bbe49eba3406

        • \Users\Admin\AppData\Local\Temp\nst39E6.tmp\InstallOptions.dll

          Filesize

          14KB

          MD5

          20f3184efe7edddfef3325efc25d12a5

          SHA1

          8db4c500d73f9525a7e9834df6caea2e70189939

          SHA256

          0e014352b64abc431d97460d79757cbafbf6ba997c08b608c294e1f582af269a

          SHA512

          433188957a4603c9c61ec698a720021aacf61f46ccc32d5a11bcb6f2d0b1f01e5680635707d8a0ec7a9ef2aa2a85d6dec07ded452e4cb9e280062c0bed555c1a

        • \Users\Admin\AppData\Local\Temp\nst39E6.tmp\LangDLL.dll

          Filesize

          5KB

          MD5

          ea60c7bd5edd6048601729bd31362c16

          SHA1

          6e6919d969eb61a141595014395b6c3f44139073

          SHA256

          4e72c8b4d36f128b25281440e59e39af7ec2080d02e024f35ac413d769d91f39

          SHA512

          f9dc35220697153bb06e3a06caf645079881cb75aed008dbe5381ecaf3442d5be03500b36bbca8b3d114845fac3d667ddf4063c16bc35d29bbea862930939993

        • \Users\Admin\AppData\Local\Temp\nst39E6.tmp\advsplash.dll

          Filesize

          5KB

          MD5

          669030d7919ae29999a2fd89aa427202

          SHA1

          870bcb7e87bbf423abcbc1c5be80f7e63720a6d8

          SHA256

          e1ae0a39d4d941cdfaf87f1df87f7ec50146e2e32705254e4d3618f74506bb82

          SHA512

          1637b854938c6b05938a3a6a06181ae70e23f6cc9a4bca4f8024db65314771197ae3d5008c83dd480ede7fec14d655dae15f439e327fc33c7b70853710621e8f