Analysis

  • max time kernel
    128s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 21:10

General

  • Target

    1c8a7390897be3ffe2903728e6433ceb.exe

  • Size

    394KB

  • MD5

    1c8a7390897be3ffe2903728e6433ceb

  • SHA1

    a835de06ea0a43170aedb52904921983acbf1839

  • SHA256

    aaf5a4cef4f2d2c013ae6950cb5d795dd885b90f9be521102c51edd035b581bc

  • SHA512

    6d140686842437fad21a5ef1b2685de28241769689ab5745eb527a1b6554edef530fc86c5cfccd0c970f122d98d83f574a5080f3ec3042bf1787274da36683f4

  • SSDEEP

    3072:MEsmBEsmBEsmBEsmBEsmBEsmBEsmBEsmBEsm4lQ23MxHSSP1w0VI51yHLHlBhyBJ:MZYZYZYZYZYZYZYZYZfeP1ZVI51yZAv

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 6 IoCs
  • Manipulates Digital Signatures 2 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c8a7390897be3ffe2903728e6433ceb.exe
    "C:\Users\Admin\AppData\Local\Temp\1c8a7390897be3ffe2903728e6433ceb.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\exc.exe
      "C:\exc.exe"
      2⤵
      • Drops file in Drivers directory
      • Manipulates Digital Signatures
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2068
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:564
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.freeav.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:324
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:1848326 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2400
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:1913865 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b77a48bb0798212cb77f843eadcbde19

    SHA1

    25e47b8cb40f98de8759af9667c4199cdb0737c3

    SHA256

    5db1397bfcb842a30f063c1205ba8046521329cb72fac634243cfb924fc923f7

    SHA512

    256aa30de8377a8cb434d0bdf15ebc0536684a2f172893bcbc1f1ce6e466950728a63e11bfc8afdc1b4519fdab45eb4a51faced7c2d21dc7fae2771c0936ca8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    140c5e59ff68b5e0afc275f61d5900ee

    SHA1

    0d0fa0ccde9b89f2a278d9117889df8dab8afae0

    SHA256

    74ea13ae4f881715f0637a4261f80603e2e284ce0ee00285edaa7098413ada42

    SHA512

    041794b574465f32fd938739913b32eb76db93e3571a0a137fa1630eb99ee8d1060bf8b6f7601bf7c30c32ec1719f02d943a7ffe9409174ca8425d9f0f483c66

  • memory/2248-8-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2248-283-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2248-622-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2248-1401-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2524-9-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2524-284-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2524-1402-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB

  • memory/2524-1988-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB