Analysis

  • max time kernel
    223s
  • max time network
    253s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 13:10

General

  • Target

    375eef7af2dc0120024cb76e3b8f37ac.exe

  • Size

    184KB

  • MD5

    375eef7af2dc0120024cb76e3b8f37ac

  • SHA1

    29416ab3e57f77f0a6e804bfae95f3259eb5ee84

  • SHA256

    dacf062c795698d8ad961e3a26ce8774a395fa4c0fccc86971e330b7c50ebe0f

  • SHA512

    b89a0ab7835b01caae06eeda7c1a83c44b8679de7ee7b8558012100f7b3634cbc6b4dd10c65f785fe4f802b7a41d6abace4bca3dc4d9f08882b84059f18066d5

  • SSDEEP

    3072:1p2jqvElYkRFzYRkfTEctFbToNoL+/pBHViXxRkp8YN0Tod7VI87BfR7K+TZcTgm:1Qqv6RFzYRKTEiFXbL+/nRp8Yp7jNFQ

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\375eef7af2dc0120024cb76e3b8f37ac.exe
    "C:\Users\Admin\AppData\Local\Temp\375eef7af2dc0120024cb76e3b8f37ac.exe"
    1⤵
    • Modifies firewall policy service
    • Adds policy Run key to start application
    • Sets service image path in registry
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\msrpc.exe

    Filesize

    184KB

    MD5

    c8a26efd536659cf574e8cbdf7f939dd

    SHA1

    2deefc209e3054869f1859ce424c0e0c7ebc896d

    SHA256

    40901056bcd828d3fade6d986fc74c87b203ae8384f4255e531feaefe8effd18

    SHA512

    0fb83a9b15d6d129ec659c483301715579ff77b1d07aba2aed511209db48a4e1eacd0b3f4ea43b9ec720df16fbf06e1e52442c70f542f32f6937436975841328

  • memory/2328-0-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2328-6-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2328-7-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2328-20-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2328-21-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2328-22-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2328-24-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/2328-25-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB