Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2024, 18:09

General

  • Target

    51404372ad2166b42f9cb6bfd09606bf.exe

  • Size

    14KB

  • MD5

    51404372ad2166b42f9cb6bfd09606bf

  • SHA1

    67a8f510fdc060c34afc3c86e47cf8f458f7419b

  • SHA256

    9c1c8291ae0737d8dc860500a10cb8fcef1ec97a6f3404158ca9d939f23ac9f3

  • SHA512

    f38ecab78c6016e263612fca0e4b0e797b90510bd838bed1135328df542322f6f7cde17774f224b378d6a26f7c80b7b802a72bf0fc2011e067bc77003679edc4

  • SSDEEP

    384:5dmHImwx5lmuKIp4kFJvAI8IWRCmua3S8O+tqoX5A/mM:5dbmwSI2kF6ILmtit+8oXi/F

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51404372ad2166b42f9cb6bfd09606bf.exe
    "C:\Users\Admin\AppData\Local\Temp\51404372ad2166b42f9cb6bfd09606bf.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\1EE6.tmp.bat
      2⤵
      • Deletes itself
      PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1EE6.tmp.bat

    Filesize

    179B

    MD5

    604c687336d3a69e8d6e53cc4c94ac67

    SHA1

    5258921564cb0a5e4ded5af78b7608832435195b

    SHA256

    ec77234f2f0f28b7f6dd732d00fe671d02359c3f606a7d9ef25cfdfb4f169249

    SHA512

    d564d4133b51ca026c8fa0142dc89be14aa465739bb8b49bd0fa656ac315667cfae59dba1d6522bcf959d5bdae0ab4faa677268bda04bd57f39409e2c3239182

  • C:\Windows\SysWOW64\adsntzt.tmp

    Filesize

    803KB

    MD5

    d743013684c23a779ad8935143952613

    SHA1

    712018067cd6199104cdf9cc7fb7fbdb171f2366

    SHA256

    307bdd5f0ca6e96e06e1577c6c357a18a010a5dcb5577b23fcacff0c589e7271

    SHA512

    289fca2138527bd17d007b36ec243fb048d6a21648a300ebd47350cd0c14d35f3ec553382f9060b451016df4cbbce795d1d40aaf34ff9e1076a61088ede0b7af