Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 07:05

General

  • Target

    403599026e72e68aceab3d573c82c8bc.exe

  • Size

    61KB

  • MD5

    403599026e72e68aceab3d573c82c8bc

  • SHA1

    571b7ecb2b805ff4f5096183a5f79f101ff982ce

  • SHA256

    454684e77418be0de8c2dc5080b703e5a3ee08252523b17f125f86669e3c541a

  • SHA512

    287cacf3fd319b8b5323a9cf34b165982058df34c3b8da58c77a37189097206463958ba13e48cf88e3cde28964b2247499900c23cdd4fe113cf7b50cf0fe5504

  • SSDEEP

    1536:jQ3UNB1up06ksNowiRY3/WE7RNJuZxb66JIj7m/4p:jQ62p0DWoXW3/WE7Md66JIXm/4p

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\403599026e72e68aceab3d573c82c8bc.exe
    "C:\Users\Admin\AppData\Local\Temp\403599026e72e68aceab3d573c82c8bc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Users\Admin\AppData\Local\Temp\loader.exe
      "C:\Users\Admin\AppData\Local\Temp\loader.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1160
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 36
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2716
    • C:\Users\Admin\AppData\Local\Temp\search.exe
      "C:\Users\Admin\AppData\Local\Temp\search.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\ProgramData\fghsbobc\vobohudo.exe
        C:\ProgramData\fghsbobc\vobohudo.exe
        3⤵
        • Executes dropped EXE
        PID:2036
      • C:\Windows\SysWOW64\cmd.exe
        /c del /f C:\Users\Admin\AppData\Local\Temp\search.exe.bak >> NUL
        3⤵
          PID:2232

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \Users\Admin\AppData\Local\Temp\loader.exe

            Filesize

            13KB

            MD5

            0ecd7860a2a53a0865ea11558315e3ce

            SHA1

            7a70573abfea1a31beb822478c2dac0932799b48

            SHA256

            8b8ab33cbb963aaf6eca78d50fd2b84b62a2a9ede8c5acd007bca7c85c8aade2

            SHA512

            7b52dd18d1b9b107bfdaab116ed752abc675ff63f63991cfa0cfa0db04238afbddc18b8acfbddf5f072a89d9e0a0d51c94fb5818a1755a42a113284e0af30a57

          • \Users\Admin\AppData\Local\Temp\search.exe

            Filesize

            72KB

            MD5

            7c96e667e91592ec3ca1fb457480ac12

            SHA1

            dad4a17691cb8b57e05e7a06fe396809737606d6

            SHA256

            256e84c0463d5e40d5a4bbeadeab7b785089100a5ab02203c0668a8cb142ef5f

            SHA512

            cc7644eb668d03ca6b68d5dceb8bf74edf08b5c53258b4b67898c36b8764e94b421bb37f4126e3355435b691063d4d59029666472e66423b5bd727105e399eab