Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 17:21

General

  • Target

    033d77609bd955cdf5383a1415734453.exe

  • Size

    100KB

  • MD5

    033d77609bd955cdf5383a1415734453

  • SHA1

    7a0bce1da55d087e341a47f342e97b0fd3eb36ca

  • SHA256

    c82610f4ab3455c770e5b9e3f16b5361ba3c135b4633c811a5130a38fa9c94b8

  • SHA512

    fafc59ab2d2850bce36c7dfe168a6e695a0af6a18c1e6cf5aaba6bd2f152962d14497a282e7fa88f83813ba80e7a96cd8c42aa66fd9df86d546f0b8af29d84ba

  • SSDEEP

    1536:BPZ8iAuismywsBfLw0wF9MGM9K/oKtNgCMbA1bL3N+NM5UfONIjnZBA:Dh/KLOM5FCnrA

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\033d77609bd955cdf5383a1415734453.exe
    "C:\Users\Admin\AppData\Local\Temp\033d77609bd955cdf5383a1415734453.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\peuig.exe
      "C:\Users\Admin\peuig.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\peuig.exe

    Filesize

    100KB

    MD5

    ee597a604164b4281f0b257a777ecf4e

    SHA1

    63770c0a5f2929275e951974b1bb1911018f8ffe

    SHA256

    1c68c5ddfdd43941e965794814fab44c5720c7b9e3f60d21dafce5a4221e6794

    SHA512

    70b2150d8c218950dfb14e1857bf7ef1a5be3c9a07b082014c63f77b5a0b0df6acefbf198f179399c95d48e2e296bb79abe31fb873612e4aed3ab34f13fa97b7