Analysis

  • max time kernel
    118s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 04:11

General

  • Target

    279e72c35e1da22a3b54952ae27be05c.exe

  • Size

    58KB

  • MD5

    279e72c35e1da22a3b54952ae27be05c

  • SHA1

    7d3c6e35b746045adde0ad6988a2b065aad270d2

  • SHA256

    5cf56064038420405669c558cf894908422f66db2214db055cb49fecc5618b81

  • SHA512

    7e18bd1eb6d72009b95a6f50a310b2f998b4272feed0197387056aff2d2640f4e43fd72351173f5c30d403535c5919bfe235d066a60e3b9f5a76dc28ba861d72

  • SSDEEP

    1536:TFzC7r8NjnQXCMtjWcEMgS+nwEHW90Jz1qJSj3GgR15:hC7r8NjQLh+wEHJJzon67

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\279e72c35e1da22a3b54952ae27be05c.exe
    "C:\Users\Admin\AppData\Local\Temp\279e72c35e1da22a3b54952ae27be05c.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\wls3.exe
      C:\Windows\wls3.exe /af8@C:\Users\Admin\AppData\Local\Temp\279e72c35e1da22a3b54952ae27be05c.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\wls3.exe

    Filesize

    58KB

    MD5

    279e72c35e1da22a3b54952ae27be05c

    SHA1

    7d3c6e35b746045adde0ad6988a2b065aad270d2

    SHA256

    5cf56064038420405669c558cf894908422f66db2214db055cb49fecc5618b81

    SHA512

    7e18bd1eb6d72009b95a6f50a310b2f998b4272feed0197387056aff2d2640f4e43fd72351173f5c30d403535c5919bfe235d066a60e3b9f5a76dc28ba861d72

  • \Users\Admin\AppData\Local\Temp\wls0.dll

    Filesize

    44KB

    MD5

    52297af1699b40f28c33eea774693049

    SHA1

    35317308fa5d145e960e087e30fc5831e52b1302

    SHA256

    48166431a598d749a46ee4339f5163709f0867f5084c6d7d8b027086d0065763

    SHA512

    4e52b3fb6fd7712f9ca927de71fd540828b6d7550c78553e1fea715256164bc5ef9c5e74c3b930d5f9fbf6fe1a11736ef66af60827e1c67283749ec64453a3c9

  • memory/2548-11-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2548-12-0x0000000000020000-0x0000000000030000-memory.dmp

    Filesize

    64KB

  • memory/2548-17-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/2548-18-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/2548-19-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/2548-20-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2548-21-0x0000000000020000-0x0000000000030000-memory.dmp

    Filesize

    64KB

  • memory/2808-5-0x0000000000430000-0x0000000000457000-memory.dmp

    Filesize

    156KB

  • memory/2808-2-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2808-10-0x0000000000430000-0x0000000000457000-memory.dmp

    Filesize

    156KB

  • memory/2808-0-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2808-13-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB

  • memory/2808-1-0x0000000000400000-0x0000000000427000-memory.dmp

    Filesize

    156KB