Analysis

  • max time kernel
    142s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02/01/2024, 15:52

General

  • Target

    09a5c7f4012b95e712d2c6ec05b3c575.exe

  • Size

    192KB

  • MD5

    09a5c7f4012b95e712d2c6ec05b3c575

  • SHA1

    ec78d353bfab977d0cbd9a1a594f188174ad3f7d

  • SHA256

    1f822212f3fd6c1c9cae1a78bfe5109adce74e235894070fd564153b8cb5acf7

  • SHA512

    64d2f5028b662361c6bf6061f6a56d55e63e03c1c6299bcf73f7c4d3de542da51d73fad6f85206e28c6dbd1625468b8b7b1c047eba11ce404f2dc990eb05724c

  • SSDEEP

    3072:3wBJ2Iish+RH5UL1iUG3KgKLKRKoVqR5VxerayK/fObT/bGicFgvXb6jGJLX:3wBJXcRZSgKgKLKRKoVqRTxEpK/fObTD

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09a5c7f4012b95e712d2c6ec05b3c575.exe
    "C:\Users\Admin\AppData\Local\Temp\09a5c7f4012b95e712d2c6ec05b3c575.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\vghas.exe
      "C:\Users\Admin\vghas.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\vghas.exe

    Filesize

    93KB

    MD5

    ebb62e3947edaaac08af57cdbc8e7345

    SHA1

    0a52f92ed7032087e6f70612d710f98c60c1e4a7

    SHA256

    8697c6b98ef30bd4941858ef9351a45b47c18babcd6ca4f6c7582dd457f53114

    SHA512

    29b4d9f315f9f4481debd1f6f0f3d03117fabe6a0619faa6821ff691fe3ce2cfbd3e0eba2577447a50d7a424cfb71f865d62afc6a3783e9e014a7a3d36db6817

  • \Users\Admin\vghas.exe

    Filesize

    192KB

    MD5

    e55692273e5b2e5ad2ca4e9bf7a58b50

    SHA1

    4f9fa2a634f813bd2d1eb2108eef795a0786fc7c

    SHA256

    3fcdbea90bb8db81cb35eba9b5d12a7872e80c02ae03e7babe56ac904c3ebc53

    SHA512

    233278b64f70379b121fca16b470133c5f4994e0822e3b517266959b4c41d97b43c6e5312cbcbd8083ec47a68d350b1e9a45dc3e033ad63704bbebd254926875

  • \Users\Admin\vghas.exe

    Filesize

    92KB

    MD5

    1c5d4633ebc353d64f7c8c7d7c026964

    SHA1

    0ed3d3d0e969c8006090ce7044f5c55b2a601b03

    SHA256

    778a4301fcef04f1489a4178089d54fe1d38f76b033dcbb12bb6088a4b01a909

    SHA512

    d09ce57ebe4c8380cedb3e939cb34649c1d6e4ca44d9be9c2fff12acd6cc184fc2e0672dc36102351099628d3cf587afac36502459767d6f163e7b20275e9e6a