Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 12:27

General

  • Target

    392db664586eaf9cbc166a7ebc9923b13eafd23adf6238a2b92782cefce0da68.exe

  • Size

    7.1MB

  • MD5

    8f0f0cb29eb6f83884569274f3a8f27c

  • SHA1

    170b9b17087bab065db160ef339e22c3b4663be6

  • SHA256

    392db664586eaf9cbc166a7ebc9923b13eafd23adf6238a2b92782cefce0da68

  • SHA512

    da35e5d8a2e4f4da887e6547669d9923f61626c59159f007e59a563ce576c26369ba7a26c6b487795a037f5b6ce312eec160e2cb60303173db96f48cbc312924

  • SSDEEP

    196608:xvXTigv7UOmCyb0Q3bUrkT5FNckx5SOaIbnK:9igTUOlybJork/NLK

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 25 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\392db664586eaf9cbc166a7ebc9923b13eafd23adf6238a2b92782cefce0da68.exe
    "C:\Users\Admin\AppData\Local\Temp\392db664586eaf9cbc166a7ebc9923b13eafd23adf6238a2b92782cefce0da68.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\@tiprayldx@\252d0c605d640857541d71c4c71baa02\Ldx.Exe
      "C:\Users\Admin\AppData\Local\Temp\@tiprayldx@\252d0c605d640857541d71c4c71baa02\Ldx.Exe" -srcfile "C:\Users\Admin\AppData\Local\Temp\392db664586eaf9cbc166a7ebc9923b13eafd23adf6238a2b92782cefce0da68.exe"
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:844
      • C:\InetPub\ftproot\Tipray\LdRead\LdxFileServer.exe
        "C:\InetPub\ftproot\Tipray\LdRead\LdxFileServer.exe" -start
        3⤵
        • Executes dropped EXE
        PID:2936
  • C:\InetPub\ftproot\Tipray\LdRead\LdReject64.exe
    "C:\InetPub\ftproot\Tipray\LdRead\LdReject64.exe" 1
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3036
  • C:\InetPub\ftproot\Tipray\LdRead\LdReject32.exe
    "C:\InetPub\ftproot\Tipray\LdRead\LdReject32.exe" 1
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3056
  • C:\InetPub\ftproot\Tipray\LdRead\LdxFileServer.exe
    "C:\InetPub\ftproot\Tipray\LdRead\LdxFileServer.exe" -service
    1⤵
    • Drops file in Drivers directory
    • Executes dropped EXE
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\@tiprayldx@\252d0c605d640857541d71c4c71baa02\LdCab.exe

    Filesize

    92KB

    MD5

    a99d58cfcd51f5b4da4d959846e78d0c

    SHA1

    a0de15e109bdfc42f42b1ea278debe5a8fceadb8

    SHA256

    930e148715c3bbf97e8b121d838ea991b2ef2d74a80148d17f4bb1597f6b67ae

    SHA512

    21723ad43af66c60acb080d9db7725dc19626a3d00e481ed0ec2e8dee7a5a64e73a226933bf9647c2d17e30565d31e147392948265c1c4a4f2e557b49adbd4ce

  • memory/844-251-0x000000006FA30000-0x000000006FA40000-memory.dmp

    Filesize

    64KB

  • memory/844-248-0x000000006FA30000-0x000000006FA40000-memory.dmp

    Filesize

    64KB

  • memory/844-253-0x000000006FA30000-0x000000006FA40000-memory.dmp

    Filesize

    64KB

  • memory/844-252-0x000000006FA30000-0x000000006FA40000-memory.dmp

    Filesize

    64KB

  • memory/844-244-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/844-250-0x0000000077A40000-0x0000000077A41000-memory.dmp

    Filesize

    4KB

  • memory/844-249-0x000000006FA30000-0x000000006FA40000-memory.dmp

    Filesize

    64KB

  • memory/844-535-0x0000000000400000-0x000000000053D000-memory.dmp

    Filesize

    1.2MB

  • memory/844-554-0x0000000077A40000-0x0000000077A41000-memory.dmp

    Filesize

    4KB

  • memory/844-553-0x0000000000400000-0x000000000053D000-memory.dmp

    Filesize

    1.2MB

  • memory/844-552-0x000000006FA30000-0x000000006FA40000-memory.dmp

    Filesize

    64KB

  • memory/844-551-0x000000006FA30000-0x000000006FA40000-memory.dmp

    Filesize

    64KB

  • memory/844-550-0x000000006FA30000-0x000000006FA40000-memory.dmp

    Filesize

    64KB