Analysis

  • max time kernel
    147s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 21:02

General

  • Target

    1c64eefc7a32213929b652e85c0f557c.exe

  • Size

    96KB

  • MD5

    1c64eefc7a32213929b652e85c0f557c

  • SHA1

    e6491d2143fd9b30555eaf0e0cf314bc730907d7

  • SHA256

    7f86693073367afd6e304c2146bae8bdebf2806dc464c9bc394c96ad1ac8360a

  • SHA512

    27f65e3100c79c850e5b1182551daa87467fe09715354e399cb6142777ae66c8aaf7b10478021229770c18e2623af1442818eb73ccf7ac3a35a139a4b42005fe

  • SSDEEP

    1536:e2V20XYBjJEd7+aDMNcHNMc6RqIbaXtZwXoErFnB5myN/N8L6surO0EE4:e2VdX7pD9NMBbaXA1rFnfmylN8L6sur4

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 5 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Windows security modification 2 TTPs 5 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c64eefc7a32213929b652e85c0f557c.exe
    "C:\Users\Admin\AppData\Local\Temp\1c64eefc7a32213929b652e85c0f557c.exe"
    1⤵
    • Looks for VMWare Tools registry key
    • Drops file in Windows directory
    PID:1852
  • C:\Windows\dllhost.exe
    "C:\Windows\dllhost.exe"
    1⤵
    • Modifies security service
    • Windows security bypass
    • Looks for VMWare Tools registry key
    • Deletes itself
    • Executes dropped EXE
    • Windows security modification
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:1948

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1852-0-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1852-2-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1852-1-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1852-9-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-14-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-16-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-10-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-11-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-12-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-13-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-8-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-7-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-17-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-18-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-19-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-20-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-21-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-22-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-23-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB

        • memory/1948-24-0x0000000000400000-0x00000000004A4000-memory.dmp

          Filesize

          656KB