Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 02:49

General

  • Target

    4293267390bab3bbfec9a2d4ef0be010.exe

  • Size

    653KB

  • MD5

    4293267390bab3bbfec9a2d4ef0be010

  • SHA1

    07a9392fdf768e8c0ec49000cfa4049ef0a83fda

  • SHA256

    f0263624c0bba08a7c392c7d511672c58ba94ecdfacce0bf94f0e67148646b28

  • SHA512

    e5577593be3bf3abfe9c03fed6215257eeb649577965eeffc708e04faeaa1b534183b4de0dd6e507b4fb3a8e2e09f612b84dba440286c45319a057588310af99

  • SSDEEP

    12288:uhbvnM36BIyhph8hjRO+meBMbm6kx+n92dMxznqvXPI0zagCI:uRE36Cyhph0jRORbPkxm0MS8I

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 1 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4293267390bab3bbfec9a2d4ef0be010.exe
    "C:\Users\Admin\AppData\Local\Temp\4293267390bab3bbfec9a2d4ef0be010.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Users\Admin\AppData\Local\Temp\nst9771.tmp\seekdns.exe
      "C:\Users\Admin\AppData\Local\Temp\nst9771.tmp\seekdns.exe" "C:\Users\Admin\AppData\Local\Temp\nst9771.tmp\seekdns.dll" -r
      2⤵
      • Executes dropped EXE
      PID:1892
    • C:\Users\Admin\AppData\Local\Temp\nst9771.tmp\seekdns.exe
      "C:\Users\Admin\AppData\Local\Temp\nst9771.tmp\seekdns.exe" "C:\Users\Admin\AppData\Local\Temp\nst9771.tmp\seekdns.dll" amecpccj ""
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      PID:1904
  • C:\ProgramData\Seekdns\seekdns147.exe
    "C:\ProgramData\Seekdns\seekdns147.exe" "C:\Program Files (x86)\Seekdns\seekdns.dll" xvwfnuxf
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Program Files (x86)\Seekdns\seekdns.exe
      "C:\Program Files (x86)\Seekdns\seekdns.exe" "C:\Program Files (x86)\Seekdns\seekdns.dll" qzygttqz
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nst9771.tmp\seekdns.dll

    Filesize

    584KB

    MD5

    1f49ac73a56be2b7582e0234e695482d

    SHA1

    e036ca3fcbb867b4a8b9183847c0c74c95fc0899

    SHA256

    453783e51e15ce08e383e4fe44f6b579dde1c8e144e2df6dfd63971316ddef3f

    SHA512

    c21f17d6e7fd36c723ca5da232a2e097b48d35ed78365d44e9e1d10297f0b9ae8acf84a4a3f1ae6c08904c6a307bf35c10db5baf7feca3677b1b36c3cf7f5d42

  • C:\Users\Admin\AppData\Local\Temp\nst9771.tmp\uninstall.exe

    Filesize

    82KB

    MD5

    e1348b87c9e541c1a959b122cc2b12f9

    SHA1

    768cc443f3de7727e2709cb2cac9835c90a03079

    SHA256

    9e5f74c04627b84b29ac9c229fc01c9f43d26e1e06501fce361b5c540552b7f5

    SHA512

    744f3256a451b2b676f69f54e0a24ac347a24fe30f007c068941073439443f0c811e1ce260f7f1a297e515d82c8bdf5973509964b50abf9ad5c664be16628223

  • \Users\Admin\AppData\Local\Temp\nst9771.tmp\seekdns.exe

    Filesize

    60KB

    MD5

    242855464cb563e26f7191b71de5a292

    SHA1

    b89c0ade9c46041e34b88fd023be867549acdabb

    SHA256

    f9ba01d75b80ed54fc21ca7d90a157bbb2bf07bd8f895a9da788483ff8bcbcaa

    SHA512

    f76d6402530481ca67ecd23637e8aa9cfad37c82b1a764362c9c01b6f5e7e9f452f66e63b20bcb63ceaf30bfb144cef68d029687c37757a188321abf98ec4a1e

  • memory/1904-24-0x0000000000350000-0x00000000003D1000-memory.dmp

    Filesize

    516KB

  • memory/2472-56-0x0000000000220000-0x00000000002A1000-memory.dmp

    Filesize

    516KB

  • memory/2576-35-0x0000000000340000-0x00000000003C1000-memory.dmp

    Filesize

    516KB