Analysis

  • max time kernel
    171s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 14:49

General

  • Target

    3d21dd3959166c87ef0fdeaed773998a.exe

  • Size

    859KB

  • MD5

    3d21dd3959166c87ef0fdeaed773998a

  • SHA1

    a351e73c40a33c57054c8485e90de28e6fc60376

  • SHA256

    095740b1c9a55ecadf092a977256456eb4e55b98679ca3307e26faa4d9ff76a6

  • SHA512

    68eb78bb8c4723c95364b92440bcdd050db520d25242bc1fb2ed4c29b3660cea9f6bbd5607d81155f0fc78cac3dc08e348dafa05cf3a95b1895a77a7558e2c05

  • SSDEEP

    24576:I0O+3i+6NjunrVOrE7ofKBeDybRrmFwLTjH:I05VwwVsOmuv7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d21dd3959166c87ef0fdeaed773998a.exe
    "C:\Users\Admin\AppData\Local\Temp\3d21dd3959166c87ef0fdeaed773998a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Users\Admin\AppData\Local\Temp\mr5.exe
      "C:\Users\Admin\AppData\Local\Temp\mr5.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\mr5.exe

    Filesize

    192KB

    MD5

    6cdccd3e402831bc64ff749875c1d1d9

    SHA1

    20739aa83a73599f4fd7fe65906a3c65bff469b1

    SHA256

    5387f7d6572c83a9df2a18909e463e53907a56eebb5478de07150f7a0360a5a5

    SHA512

    74df0d0270a22f31f5428db0dc5291ca35f2ac3c66d8818e59aab52313d5b528b128fffe189825c0917dda46ed140e41c06ce2407de0e758ab63b99099ebe40d

  • memory/2740-7-0x0000000000020000-0x0000000000031000-memory.dmp

    Filesize

    68KB

  • memory/2740-8-0x0000000000020000-0x0000000000031000-memory.dmp

    Filesize

    68KB

  • memory/2740-9-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2740-10-0x00000000002E0000-0x00000000002E5000-memory.dmp

    Filesize

    20KB

  • memory/2740-14-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2740-16-0x0000000000020000-0x0000000000031000-memory.dmp

    Filesize

    68KB

  • memory/2788-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2788-13-0x0000000000400000-0x00000000004DE000-memory.dmp

    Filesize

    888KB

  • memory/2788-15-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB