Analysis
-
max time kernel
7s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 19:44
Static task
static1
Behavioral task
behavioral1
Sample
3db6c9f7690587b3fc0b232083cd92c6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3db6c9f7690587b3fc0b232083cd92c6.exe
Resource
win10v2004-20231215-en
General
-
Target
3db6c9f7690587b3fc0b232083cd92c6.exe
-
Size
124KB
-
MD5
3db6c9f7690587b3fc0b232083cd92c6
-
SHA1
e6ea10caa535afe2ee80da91070a0abf0bf01748
-
SHA256
a2a7d0ff3663878c9cccd3862e47b98ffb63ef3edccdd0928f7efd7ab80ba281
-
SHA512
b8eaaa8394c462963758d0da8617a6796cd0c78bc9006845591ce73c8c61ec5fc32b83c1a00cffc98cdd6dd1d5074f13dbe12e3381c838cc913b2507c641da55
-
SSDEEP
1536:6btkjqTQDQU0GgAJa0P1kNmKldCMhdu8KWP/nTn8nBP9VewNeG0h/l:akj5DQU0GgAT98t
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 3db6c9f7690587b3fc0b232083cd92c6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" mhhir.exe -
Executes dropped EXE 1 IoCs
pid Process 2436 mhhir.exe -
Loads dropped DLL 2 IoCs
pid Process 2108 3db6c9f7690587b3fc0b232083cd92c6.exe 2108 3db6c9f7690587b3fc0b232083cd92c6.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\mhhir = "C:\\Users\\Admin\\mhhir.exe /W" mhhir.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\mhhir = "C:\\Users\\Admin\\mhhir.exe /h" 3db6c9f7690587b3fc0b232083cd92c6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\mhhir = "C:\\Users\\Admin\\mhhir.exe /p" mhhir.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\mhhir = "C:\\Users\\Admin\\mhhir.exe /x" mhhir.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2108 3db6c9f7690587b3fc0b232083cd92c6.exe 2436 mhhir.exe 2436 mhhir.exe 2436 mhhir.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2108 3db6c9f7690587b3fc0b232083cd92c6.exe 2436 mhhir.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2436 2108 3db6c9f7690587b3fc0b232083cd92c6.exe 28 PID 2108 wrote to memory of 2436 2108 3db6c9f7690587b3fc0b232083cd92c6.exe 28 PID 2108 wrote to memory of 2436 2108 3db6c9f7690587b3fc0b232083cd92c6.exe 28 PID 2108 wrote to memory of 2436 2108 3db6c9f7690587b3fc0b232083cd92c6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3db6c9f7690587b3fc0b232083cd92c6.exe"C:\Users\Admin\AppData\Local\Temp\3db6c9f7690587b3fc0b232083cd92c6.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\mhhir.exe"C:\Users\Admin\mhhir.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52b4a7f8755477e72102870cc6f0adf48
SHA10e491391e541a7a3e51a13b801ad528f987e0f16
SHA2561ca8f6cfd759a2039696a058d8cb1cebf4a5dd54b875ffa7b3f1eca6dacdaec7
SHA5126f3e6faea214ae2fd0effb9993eff98b38978286cf52e37242b93c7bf0d6ecda35cdf02d3dde5222753fa8efc1347a66349e00262d35880ad7fd22d6c4e8ffd5