Analysis

  • max time kernel
    149s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2024 18:49

General

  • Target

    3d9b9d376018e32d658b205f1c4d8800.exe

  • Size

    159KB

  • MD5

    3d9b9d376018e32d658b205f1c4d8800

  • SHA1

    75231cf7a162b5585335993d89acb5ec6c11e4cd

  • SHA256

    6d4be4e15bb062f1e90c6a7272c697aa4adbaca324a2ad7d918308e0d07a0501

  • SHA512

    51775443e0ad5d8fcfc76af15d862240a62ce8dbf21f3f9ed5a0ab7e7992729c697e574a5fab7e7113607e288eeb0bc2b66afa7ba8731192361e77b21e438d33

  • SSDEEP

    3072:u3zyLTvBYetasoHpjXwNuxzyATJEhDHWewZcdQwMwfci:u3zeTlWhwY5yATWH9wZcd1Mwki

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d9b9d376018e32d658b205f1c4d8800.exe
    "C:\Users\Admin\AppData\Local\Temp\3d9b9d376018e32d658b205f1c4d8800.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Users\Admin\AppData\Local\Temp\3d9b9d376018e32d658b205f1c4d8800.exe
      "C:\Users\Admin\AppData\Local\Temp\3d9b9d376018e32d658b205f1c4d8800.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Users\Admin\AppData\Local\Temp\3d9b9d376018e32d658b205f1c4d8800.exe
        "C:\Users\Admin\AppData\Local\Temp\3d9b9d376018e32d658b205f1c4d8800.exe"
        3⤵
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4768
        • C:\Users\Admin\AppData\Roaming\Sqqdqv.exe
          "C:\Users\Admin\AppData\Roaming\Sqqdqv.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4372
          • C:\Users\Admin\AppData\Roaming\Sqqdqv.exe
            "C:\Users\Admin\AppData\Roaming\Sqqdqv.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2468
            • C:\Users\Admin\AppData\Roaming\Sqqdqv.exe
              "C:\Users\Admin\AppData\Roaming\Sqqdqv.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1852
              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1900
                • C:\Program Files\Internet Explorer\IEXPLORE.EXE
                  "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
                  8⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1404
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1404 CREDAT:17410 /prefetch:2
                    9⤵
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:1352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DV2I56HE\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • memory/1852-34-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1852-38-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2328-7-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2328-6-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/2328-4-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/4768-10-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4768-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4768-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4768-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB