Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 04:20

General

  • Target

    3be08c9d072256c418df5a357310e50c.exe

  • Size

    148KB

  • MD5

    3be08c9d072256c418df5a357310e50c

  • SHA1

    82ceee9eab33e96f00cf745447896c25c77377f0

  • SHA256

    5b70eb43a656b9edddbb1adbfc9e6adefea11ba5d7a185e730e6a3a89d4dcdd2

  • SHA512

    2125406f14dd24e867e712e3a75ff47ce3c5f56b600abc13e08486fe9f93d9dc78d7b0b1c66c40035c87cc875d4a05cb59f94facefee17342a5b77f18613b9b1

  • SSDEEP

    3072:6SeJqFzxgwMylAUR6UQUcJPPB5RPXsS+t9jiC4oQZiEu4:66FzxgZVU49xEtlzWj

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3be08c9d072256c418df5a357310e50c.exe
    "C:\Users\Admin\AppData\Local\Temp\3be08c9d072256c418df5a357310e50c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\bigeb.exe
      "C:\Users\Admin\bigeb.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2684

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\bigeb.exe

          Filesize

          148KB

          MD5

          346f3dd09807c33be3ce301f652e56e6

          SHA1

          fbc63e45308f0e1fe459453b90bb6944089e8ed8

          SHA256

          a2fbd08195fcf3e085a45332c034e239c71c3e641d61f5b78eb90196d69ee52f

          SHA512

          7b4048629ab50c5938d25caaa0b76671c1dcdea94723e4f3d73e36d8e737899758064589af23e21ad826a8fbef655ff69c3fe81abd7a8d169499c7c22de1de08

        • \Users\Admin\bigeb.exe

          Filesize

          106KB

          MD5

          16e97310ed60b83deb7abf4f25550d69

          SHA1

          b789532b309a3408471fc03874c07c57533da8ff

          SHA256

          99fc4909f4356774d468bdd6dee26807291db6afb5ec06a24d28f16fa3fdedc1

          SHA512

          6f03a9597d29703ccba1a2788f83115c399e3d52bae65e1146128c4ddfaa07ab20520ed3fe2c371ca5dd0fa7158e4a098ce5f132879312f9fc2007dccc876a9b