Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 16:18

General

  • Target

    3d506f3a42cd179ff7adaba5781f30d4.exe

  • Size

    18KB

  • MD5

    3d506f3a42cd179ff7adaba5781f30d4

  • SHA1

    22dff2a0ff3d659ce72fa68983968688fa733a0e

  • SHA256

    e5b2fec0c5c8cd40e200c99ebf633d5f9dbc187ee24d8ecd88ab9fb3e2217361

  • SHA512

    03075ca94ae31ff496809511efaa764f5e4e2519d5f89dd066479f35bf280d9270b011a27ddea06b95f1b33de64ec8a9fc88537cb8e1175540a17ea9a863f9cd

  • SSDEEP

    384:zAMbrzR6wH1pyKVSA+e9dzLbSlVFJAxvr6+e9Pfqbn1v1:zhzR6wH/PVSATx+ha5v

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d506f3a42cd179ff7adaba5781f30d4.exe
    "C:\Users\Admin\AppData\Local\Temp\3d506f3a42cd179ff7adaba5781f30d4.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Windows\Rundll32.exe
      C:\Windows\Rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Suspicious use of SetWindowsHookEx
      PID:2712
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\killme.bat
      2⤵
      • Deletes itself
      PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\killme.bat

    Filesize

    91B

    MD5

    679fe6a8f51765e07fb207d8a4e93f0a

    SHA1

    88b17e7b4917c1ad99928d7a83db19b626d529cb

    SHA256

    6b3cdeccfc81f0fd6caa2841600fe09aceff08daf31d7a3c31ce52d5c31d8a66

    SHA512

    bc013e2e65010129d9237d7bdc0ad4af34e8cadcf97018f8b3a2d2e00d49f3501ddca9a2499dc36b805a242d63eef1b2ea83e7633514022fe19e4f4b45a2251d

  • C:\Windows\Rundll32.exe

    Filesize

    18KB

    MD5

    3d506f3a42cd179ff7adaba5781f30d4

    SHA1

    22dff2a0ff3d659ce72fa68983968688fa733a0e

    SHA256

    e5b2fec0c5c8cd40e200c99ebf633d5f9dbc187ee24d8ecd88ab9fb3e2217361

    SHA512

    03075ca94ae31ff496809511efaa764f5e4e2519d5f89dd066479f35bf280d9270b011a27ddea06b95f1b33de64ec8a9fc88537cb8e1175540a17ea9a863f9cd

  • memory/2656-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2656-10-0x00000000003E0000-0x00000000003EE000-memory.dmp

    Filesize

    56KB

  • memory/2656-21-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2712-12-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2712-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB