Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08/01/2024, 22:27

General

  • Target

    4c9d7438e4f82a53a645c112b22113c5.exe

  • Size

    380KB

  • MD5

    4c9d7438e4f82a53a645c112b22113c5

  • SHA1

    c7693156791ce2d538e651fabca86da822477584

  • SHA256

    47cad491bdbc67f0497e239128860709a830c6d137268800240536190993f5b9

  • SHA512

    71ef125c3ba93c6b5ff2076c59e7b1a927e23ddb364fd8970fb41d64f2cc802c8607d88cc4af15010fa4327e9815858b82f491bc8da29d0f9b914ecf02edd7bf

  • SSDEEP

    6144:BhYeUK1Zc/jWhvd0yTN8jT0M1zWyjYd0cdo:3Y7KQeV0Ce0IzWvW

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c9d7438e4f82a53a645c112b22113c5.exe
    "C:\Users\Admin\AppData\Local\Temp\4c9d7438e4f82a53a645c112b22113c5.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Users\Admin\neutii.exe
      "C:\Users\Admin\neutii.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2884

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\neutii.exe

          Filesize

          380KB

          MD5

          be97585d08ce8623e062e021805478c9

          SHA1

          d7f0038779fa5c88533d34e119910f04bc988c71

          SHA256

          db79a188211749c2d802217799a1b37c5321c2b4f79214f9c88ed06d66d5b574

          SHA512

          8806cc9458f7a9e820b88fc01eee5c6e969b1667466f96aa6ee9d442029ebf418f09b1cbc406fe72687ebe8290237b1a56366d91d9237980ffaf6eb4daadee1a