Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 16:18

General

  • Target

    4ec667a1d6a962070df636a75905e677.exe

  • Size

    91KB

  • MD5

    4ec667a1d6a962070df636a75905e677

  • SHA1

    50bdcae3c5fdd60a437ea8779a227f53ea2be0f9

  • SHA256

    7def19525a3bf0067d6147b1bfd33b720bac523f0cd38c882a2d742ac36abd40

  • SHA512

    8f1197ed7d161aade177ad2929a44564d8cdf9dba99caac93b7e44c1b9f02a1b2a51eaead4f1d8796fcf95af02b56435165cd1311e2d0c4132c30f7baf2d41fa

  • SSDEEP

    768:XTToANTmNOdkk7taeICWzDpCMJrBDsX9MihU+jdVZWtdATTo1:XTToANqNOdRDWzdnsdhUsZWtWTTo1

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 45 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ec667a1d6a962070df636a75905e677.exe
    "C:\Users\Admin\AppData\Local\Temp\4ec667a1d6a962070df636a75905e677.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3924
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Windows\khaxhakvggiqgmufrdyi\dllxgfazkrgqr.dll"
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:3584
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c regedit.exe /s C:\Windows\reg.reg
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3340
      • C:\Windows\SysWOW64\regedit.exe
        regedit.exe /s C:\Windows\reg.reg
        3⤵
        • Installs/modifies Browser Helper Object
        • Runs .reg file with regedit
        PID:868

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\khaxhakvggiqgmufrdyi\dllxgfazkrgqr.dll

          Filesize

          2.5MB

          MD5

          3b0760077c188bb3ce6972169b1613c2

          SHA1

          cb3d50fe0a23a8bbd2558c6079b4b7d937fc4ea6

          SHA256

          0fd9eef17a1eda66f8eb74145f0935ea3a79d09335f5e8e035a822532a0258d0

          SHA512

          d7d71766cec49ec98291dff25cc4d57731ee90285ac122368f35817ed0fc5b36497dd5a21b4cbb09f3f4c14a155370c79899f2269c41bf1b8eb5c24d038f82ff

        • C:\Windows\khaxhakvggiqgmufrdyi\dllxgfazkrgqr.dll

          Filesize

          2.9MB

          MD5

          02c30384db5b2abaf986621b2f4014ec

          SHA1

          4440ab1d55215f6e45dedcf382ca5a21a8993e00

          SHA256

          6ef66a01ecd50e52e349d8d55ed5db97741c19086ada1440e1c0f63ad9ae7f37

          SHA512

          20dbfb9ca5e34ec42651d8a4daba98b2997d016972dded504b1199abab9c39d6f720dcfaa163972375614f90320b5587117806e8d6bb83fd7222e253c6acf8bc

        • C:\Windows\reg.reg

          Filesize

          185B

          MD5

          e7ec5d1748cbe59ab5ee02805c9530af

          SHA1

          cd5f89ea21cf72e5ce94d36aa00618bfd9c39a5c

          SHA256

          36845b1f85dbc963f36bded837503db0b551194d62fd00db431e1c1e4dd783c3

          SHA512

          f9af7930ec0021c72102eb4645dece32fb6bf0f7a054e2634ff26fa334ac79bf29ddcd69dbb5960897880da52693ce0fd9c69b4ccacdbb62dc9b5b91b6cdbe9c

        • memory/3924-0-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/3924-10-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB