Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 03:14

General

  • Target

    25ff3f64992904edc2445f0c131c3947.exe

  • Size

    44KB

  • MD5

    25ff3f64992904edc2445f0c131c3947

  • SHA1

    ace422a4479041d10507d67e55a3f5a5d678686d

  • SHA256

    d96bd8ec718cf6dfb15a7ce4476602b19b5ad26aa88bb73f5cc3b09d467ca225

  • SHA512

    7597323d4b202612edd18a22ffd6d32976b1ce9729ad064821a771c47d066b0164a74727f34b30567aba7415d8072baa27f30368fb69484c6e5f498d02e0e23a

  • SSDEEP

    768:PerX6vTVmUOsTs+WrUHN6c8Ux9ra6uN+9cUskiHof7h+WDmorbwN:qUOsTNVNrPra6uN+qYlaK+

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25ff3f64992904edc2445f0c131c3947.exe
    "C:\Users\Admin\AppData\Local\Temp\25ff3f64992904edc2445f0c131c3947.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\Deleteme.bat
      2⤵
      • Deletes itself
      PID:2244
    • C:\Windows\SysWOW64\svchest.exe
      "C:\Windows\system32\svchest.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2136-0-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2136-15-0x00000000034D0000-0x0000000003506000-memory.dmp

    Filesize

    216KB

  • memory/2136-11-0x00000000034D0000-0x0000000003506000-memory.dmp

    Filesize

    216KB

  • memory/2136-26-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2848-22-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2848-27-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2848-28-0x00000000001B0000-0x00000000001BB000-memory.dmp

    Filesize

    44KB