Analysis

  • max time kernel
    148s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2024, 10:18

General

  • Target

    3cf8a5ce4d9807305f45000deeae1e91.exe

  • Size

    280KB

  • MD5

    3cf8a5ce4d9807305f45000deeae1e91

  • SHA1

    cf97eefbe550e198f33201e7ead09b95e29142f4

  • SHA256

    ecf46b479ece60e483914f49623e34e2955271a6861349e6d09ac128f2a88203

  • SHA512

    f1c6613e6c5acfe2fdd02d0b56b9957f9a0d27e93da9395b786865b8532f3d298f78d19ccc0eba672a552089a948edaabb8659ca263f66812b97a106ecbb282e

  • SSDEEP

    6144:BjPTYaHb3z74L2pYjn1izCbwNkVsuaRaU6mHGX:BjTp3z7pK1izCbO0aRz6mHGX

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cf8a5ce4d9807305f45000deeae1e91.exe
    "C:\Users\Admin\AppData\Local\Temp\3cf8a5ce4d9807305f45000deeae1e91.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Roaming\NATEONAd.exe
      C:\Users\Admin\AppData\Roaming\NATEONAd.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2924
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\NATEONAd.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\NATEONAd.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\NATEONAd.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\NATEONAd.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2308

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\NATEONAd.exe

          Filesize

          15KB

          MD5

          7b49ab26e4839b6519825b2d90a88baf

          SHA1

          8ef9fc4038dba879e87ef0ee03095ef52eb810ee

          SHA256

          c5b8680faabad4bcb72e517b33d095330c0e8904257783c6ec6454d449106203

          SHA512

          4a7c61deef0dec80fb0c40dcca81fafe023070a3961053b2f4ad325f6591238b24311498a9e4424c4705614e2786985cf9ae434432496e863a33667654ebb12f

        • C:\Users\Admin\AppData\Roaming\NATEONAd.exe

          Filesize

          61KB

          MD5

          25e1a53c1c22edbae857d55ce6896d6b

          SHA1

          9b7cfae26c415dd42f4017e0fb23f4ce0b256785

          SHA256

          04f3d99f85458d154993b9db87f9bb9ad08b20de67481c8906ad93a2b69f19ba

          SHA512

          cfd66a76ffc0185b704b6dd6326a41ced456321eddb6f66f782f1c2701dd6b657d46b239acedd2b2703efca86a5ad777cc201a574254d9aa75985a34912b669e

        • C:\Users\Admin\AppData\Roaming\NATEONAd.exe

          Filesize

          1KB

          MD5

          2b0c47c5948dc2e2c11262ad3a1cf00a

          SHA1

          8d7a91a552198489455c70ac0055fc568e120b25

          SHA256

          93d0e7ee7a67633ec31316d9146c166cff94863be9378943803b7916f6381e75

          SHA512

          9a30556bef5ecea4ebcae54d162a11090911c9b309b35678ac20feb6c8cabd6e9dbfca6934881e36341eb4ba4a1a9adbe3906b149a993bd7015a8d72e2dbb936

        • \Users\Admin\AppData\Roaming\NATEONAd.exe

          Filesize

          280KB

          MD5

          3cf8a5ce4d9807305f45000deeae1e91

          SHA1

          cf97eefbe550e198f33201e7ead09b95e29142f4

          SHA256

          ecf46b479ece60e483914f49623e34e2955271a6861349e6d09ac128f2a88203

          SHA512

          f1c6613e6c5acfe2fdd02d0b56b9957f9a0d27e93da9395b786865b8532f3d298f78d19ccc0eba672a552089a948edaabb8659ca263f66812b97a106ecbb282e

        • \Users\Admin\AppData\Roaming\NATEONAd.exe

          Filesize

          32KB

          MD5

          0dee46207d0ee8a291b6657cbf97a27a

          SHA1

          be1f98ce20c1a563dd7b08f2a30a258a8fc61d8b

          SHA256

          9696b7098a263c59a1479ff6eb3e1a425bd9e0f4e535d981fc7b08b39347e20a

          SHA512

          abcea3add4e0172ab53daddee0b969c08ad92b6b0965d02942194214b3cf50005153f57c4ce6e6b367d01ccc3510dfdcef7bc371d55c1593dac0e69447322389

        • \Windows\SysWOW64\mswinsck.ocx

          Filesize

          105KB

          MD5

          9484c04258830aa3c2f2a70eb041414c

          SHA1

          b242a4fb0e9dcf14cb51dc36027baff9a79cb823

          SHA256

          bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

          SHA512

          9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0