Analysis

  • max time kernel
    172s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 17:33

General

  • Target

    3aa509a9845a0f9e2a1f8c14f9543de7.exe

  • Size

    108KB

  • MD5

    3aa509a9845a0f9e2a1f8c14f9543de7

  • SHA1

    7f308f5bbf0e190c902335c164832ad7bc398ef0

  • SHA256

    f02fcfeecd8befe493b8c70ffcab2360a13f9d3f811db862452fe69ec37077c7

  • SHA512

    b2236f3723142a9e21dade4b5968b2b3c60f3193fa0e9ea8f32e5bd5de8efe2bd9f9bbe92c5cb2c74670f789f8eb70084266db146420e9e88e6eb3d0a1e400e5

  • SSDEEP

    3072:56Oji0kMPo3srsAPECcuu9WNRlJUqQa0SDl7W3:sOjEMw3kGCdnNR0S56

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3aa509a9845a0f9e2a1f8c14f9543de7.exe
    "C:\Users\Admin\AppData\Local\Temp\3aa509a9845a0f9e2a1f8c14f9543de7.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\wseralt.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\wseralt.dll",iep
        3⤵
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\wseralt.dll

    Filesize

    108KB

    MD5

    c019bf4cea2170b9fa543d70d7c33f8b

    SHA1

    0da34a383f523d73c50bc8a6add9b958c68193d3

    SHA256

    ca7a3eb22ee24d919ad94ed4934d71fd98e739fc8f958caaea867bd4d4393de8

    SHA512

    cc9242d9d87d2ed1173d91f5d94573a2c5a49cfd02df55335ba669af558963a7988a7f631c556127ee2f9fa173cd679b89ac23e8085a1641a5a39b93a6a0f4d5

  • memory/2616-11-0x0000000010000000-0x000000001001B000-memory.dmp

    Filesize

    108KB

  • memory/2616-7-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/2616-13-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/2616-8-0x0000000010000000-0x000000001001B000-memory.dmp

    Filesize

    108KB

  • memory/2616-14-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/2616-9-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/2616-22-0x0000000010000000-0x000000001001B000-memory.dmp

    Filesize

    108KB

  • memory/2616-17-0x0000000010000000-0x000000001001B000-memory.dmp

    Filesize

    108KB

  • memory/2852-18-0x0000000002540000-0x0000000002550000-memory.dmp

    Filesize

    64KB

  • memory/2852-19-0x0000000002540000-0x0000000002550000-memory.dmp

    Filesize

    64KB

  • memory/2852-21-0x0000000010000000-0x000000001001B000-memory.dmp

    Filesize

    108KB

  • memory/2852-24-0x0000000002540000-0x0000000002550000-memory.dmp

    Filesize

    64KB

  • memory/2852-25-0x0000000002540000-0x0000000002550000-memory.dmp

    Filesize

    64KB

  • memory/4016-1-0x00000000022E0000-0x00000000022F0000-memory.dmp

    Filesize

    64KB

  • memory/4016-2-0x00000000022E0000-0x00000000022F0000-memory.dmp

    Filesize

    64KB

  • memory/4016-0-0x0000000010000000-0x000000001001B000-memory.dmp

    Filesize

    108KB

  • memory/4016-10-0x0000000010000000-0x000000001001B000-memory.dmp

    Filesize

    108KB