Analysis

  • max time kernel
    0s
  • max time network
    1s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 05:52

General

  • Target

    2abeca23cb51f843f76f554343c7b553.exe

  • Size

    19KB

  • MD5

    2abeca23cb51f843f76f554343c7b553

  • SHA1

    179ac139d6d83c68922517fbb7c7fa28e930963b

  • SHA256

    8ae6b7bd95bd3adab1ec9b2a787129ca19a9bc05d159d4aea4eed2366c524ab8

  • SHA512

    aa893ee39c22e306441175af43bfb006f10f44d7090327906cbf0c6377af29fe433e3276adbff2c7ffd2ae179e22a3d09c05df8d412232b1c3165132745fa0e8

  • SSDEEP

    384:3/ozqXE3T/AMI2tJmfJe1y2H4nz0NHWgkTop+iPdqmBp15x1cwt:v6qqU6AJeo2VHWgoop91qmJqK

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1100
      • C:\Users\Admin\AppData\Local\Temp\2abeca23cb51f843f76f554343c7b553.exe
        "C:\Users\Admin\AppData\Local\Temp\2abeca23cb51f843f76f554343c7b553.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1100-2-0x00000000024D0000-0x00000000024D1000-memory.dmp

      Filesize

      4KB

    • memory/1664-10-0x0000000000401000-0x0000000000402000-memory.dmp

      Filesize

      4KB

    • memory/1664-11-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB