Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 00:15

General

  • Target

    21539bc29b75eba7f203c6dfbad6f111.exe

  • Size

    268KB

  • MD5

    21539bc29b75eba7f203c6dfbad6f111

  • SHA1

    ec7c4ffe8d1b749e721c749167bc89ec72776bfe

  • SHA256

    ff18bd17d818e81800acba7c65abef03e873d92aec882332468f4f66313b4804

  • SHA512

    32b0340174167cc77046e2a006038cb698595c805b2ea92cda32f2b7ec47e54e1ea1f8a1e67f50bc3e13fef69823f6bae7711da271ba6da874c07ee548582663

  • SSDEEP

    6144:CRPpbZRml8z94sYxeTfXys6zlbG95POPHQ7TlSqSeiD4/uhHCA4ydSZb0ng:KPpbZRi8z94da64RyHQ7TlUJ4/uLng

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21539bc29b75eba7f203c6dfbad6f111.exe
    "C:\Users\Admin\AppData\Local\Temp\21539bc29b75eba7f203c6dfbad6f111.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\bexed.exe
      "C:\Users\Admin\bexed.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\bexed.exe

    Filesize

    128KB

    MD5

    38237afdb2a74f5ae9a214d184db36a5

    SHA1

    e97430cd378bc02a37d2b1c8e5846f6c0460fc84

    SHA256

    06d479097fb6d7d4470deb46a4e7ccf5d23eab791a9c9137b0ba10998ccbed1a

    SHA512

    717868b285b7a9384e4f8e18161abf7467c3857a52581fbce3797fd836db7d4032fd75fbaa4df3171c3c0260d8b5a02f83ea4bc33c20a050f31abd651b393f92

  • C:\Users\Admin\bexed.exe

    Filesize

    128KB

    MD5

    6d0ecba2682891ed3b9de967cabc4af8

    SHA1

    581dc53cfcc7a178a5d3617de032985692bd63e3

    SHA256

    63a0eb79863df5e294a5f7880046c6e26220da1079f86bd19dcee08b1f045ebf

    SHA512

    ee9cb54e7ba2f673926e86abc1566bf4b1b4dcefbade885ade4d9d75fbd68491b16be832f2e31e4e9fdfdcde0de2d2d7f946b437ed45fccc63fb0181908f0a8d

  • C:\Users\Admin\bexed.exe

    Filesize

    256KB

    MD5

    090927d4ee149207f89373c3f9fe569d

    SHA1

    02cb9981d2e65db960622e09300c3d3dae9b1779

    SHA256

    e6ebec6ec21f3ed00f985925ac2804fa5f525df8fb03d3e62c01219b451fffec

    SHA512

    b18f9e32e888940c8685556137f3e8f8a5bfdf353e3c3e70e2d93a5dee0de102a9acf9a5bc7e408f5db92515090bb1c2e49ba4d1f5a966ef657747a5236458e2

  • \Users\Admin\bexed.exe

    Filesize

    259KB

    MD5

    4b199ea3aa7aa7bd8d3eb400eed20b96

    SHA1

    334d0ee68b2cff33287e7bca9ac060f16307e239

    SHA256

    30bb3fb5e2453fa60fa76ecd6de490c8907c9323d6e66292054efd66cf000c88

    SHA512

    9cf4a896b44a0bc395924e5ab160de7eda800d10792100806fe460c2ff1c2fcd0281f718132cb2e05afff015394d6c76201c3034aeff7802d66c8280077fbd5f

  • \Users\Admin\bexed.exe

    Filesize

    161KB

    MD5

    cd35b6236cf5f2c8221b47c8b59c67c5

    SHA1

    5b193bea3db0a174ab50fda11431a89b5b77411d

    SHA256

    a91adc30ae63c5611c22fcd8e9e8c9160893885b1f9dd0abb89134cc643199f6

    SHA512

    a7077d0141e0a7f72132d3735ef2599caa9c0369bfedb6d4a42981c044db2bb0fd421bc165fb4d500638a1da3a0d67a0b0ca7b987827c5fff28d083ab6e6e534