Analysis

  • max time kernel
    145s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 17:28

General

  • Target

    571128a44326144850262cb5e04dcb45.exe

  • Size

    1.2MB

  • MD5

    571128a44326144850262cb5e04dcb45

  • SHA1

    03d037a9ed7fd22b002563b76b65919fd40c50f4

  • SHA256

    f01cf298000932a1866efc07845e348454d31e082513d58bac4023895976c7cf

  • SHA512

    387c0633fb01d8de0b790ff302aef7bef25b95f929104b34cb928cf31b0750051f1af5b9dd60fdfb7b8e8a6dbaa81e2e1f80d65b34351e4dd36d8300b07ffef7

  • SSDEEP

    24576:XI2Qm/0o3OEFw3w7wh2KRsmKq83vMg/X:XI2Qm9e73BHRcnMA

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\571128a44326144850262cb5e04dcb45.exe
    "C:\Users\Admin\AppData\Local\Temp\571128a44326144850262cb5e04dcb45.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\379030.bat" "
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\SysWOW64\reg.exe
        reg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v 571128a44326144850262cb5e04dcb45 /f
        3⤵
        • Modifies registry key
        PID:2812
      • C:\Users\Admin\AppData\Local\29119583.exe
        C:\Users\Admin\AppData\Local\29119583.exe -i
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2140

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\29119583.exe

          Filesize

          327KB

          MD5

          632aa4a3b95e225d1e683a4e80294baf

          SHA1

          a65c6498388469c7f059efb8cc8eb4a1e91ed07a

          SHA256

          ee1d3948858b9d52c21dd1087f73aada7854a7ffda8e3ccd2b78472524cea48e

          SHA512

          0751d9a3ac738811d7704d0f60536258fcf0ab347c36b85bd545e9c546ffe6e6af96b475ed98468833afbbd462429774d44b284e395600319807757cf8be9e7b

        • C:\Users\Admin\AppData\Local\29119583.exe

          Filesize

          153KB

          MD5

          8bc57e570c35fad9b7459486e067fa48

          SHA1

          b8d508ba6e4079bbdf9177c04665ed513c8e2cf2

          SHA256

          49737a02d5a98964e21e625da6af1227133d9b5cbe2792884df22b0ec25b98df

          SHA512

          900e6f2c0e745c8ae0150dff89cdaf35bb0fd49694ea50fe3af7b354c492c1ef194c94e10de6fb5e9c21872bf88538eaff91e3fcc2b999c0a40a1b2bd8b3f1a5

        • C:\Users\Admin\AppData\Local\Temp\379030.bat

          Filesize

          424B

          MD5

          a36ba85760b9f191c9017b29aae44850

          SHA1

          0db132bbbf1cc9e1013803539f1ab3e4de433363

          SHA256

          abacc8ffd416c4a35e0683f0d6a27b2b60642d7ee17eafbd1c1570bc366765ba

          SHA512

          3a9e3755417b6c35ea958efe4477ae26040a831f2cf2a278bd3e05038f9fe2c2e4fc65c9f8539e311c0aebe533bcfb20cbba5c4f5028ea7494808db340cde128

        • \Users\Admin\AppData\Local\29119583.exe

          Filesize

          272KB

          MD5

          3d6682c74c08817465a66b0e7668b992

          SHA1

          680931bd7436c2470d8181ef3eb53665dcb1d84c

          SHA256

          7736ba5861c95d40ec6b8ec771b95c4694ccd61d8b579724a9ccd4c1c0187bc6

          SHA512

          e60d60a30542e579bdea276d405f82333afa5ccf2d0312e330c29b63ad5d162c391b1e220f55039009fcc6230f85f70890083c62d115a5b22de255ac0bcc6473

        • \Users\Admin\AppData\Local\29119583.exe

          Filesize

          173KB

          MD5

          5525af7978cc150cdca3d5d9f5a0df15

          SHA1

          6e3f718a64a816bbc641c56559d503a5171ec4da

          SHA256

          908be00b1db163b205f4f9248a404b7203dda70139fe0592aa3e9bd8c6cf054d

          SHA512

          24bab58c8c364c31d61dc9679e593514baa88ba02c9dc249edaead175d8f8d22d824286c699d7c3a872f41e590bdcf2ea7fa78af6891a0b74431cf5cf60fd495

        • \Users\Admin\AppData\Local\29119583.exe

          Filesize

          932KB

          MD5

          30ec3396c191757b66d9266645fa086f

          SHA1

          f85741fa6441f848f7043a15e5ea5a3ca4feb11c

          SHA256

          5990336d7edda6dec8bc868795ef44b4163b1d32514d0721c6ed3d86d56f35c6

          SHA512

          1244864fcead0d76e1362f7c01882d3947426a72d82737d7129a4e77e6a433df6c919abbd2b74043de9c79c4f6e3bf4eb9b18d74a82755fdefc30c6eb8fe6901

        • \Users\Admin\AppData\Local\29119583.exe

          Filesize

          1.2MB

          MD5

          571128a44326144850262cb5e04dcb45

          SHA1

          03d037a9ed7fd22b002563b76b65919fd40c50f4

          SHA256

          f01cf298000932a1866efc07845e348454d31e082513d58bac4023895976c7cf

          SHA512

          387c0633fb01d8de0b790ff302aef7bef25b95f929104b34cb928cf31b0750051f1af5b9dd60fdfb7b8e8a6dbaa81e2e1f80d65b34351e4dd36d8300b07ffef7

        • memory/1512-3-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/1512-16-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/1512-7-0x0000000000240000-0x0000000000242000-memory.dmp

          Filesize

          8KB

        • memory/1512-8-0x0000000000250000-0x0000000000251000-memory.dmp

          Filesize

          4KB

        • memory/1512-6-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/1512-2-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/1512-1-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/1512-0-0x0000000000230000-0x0000000000231000-memory.dmp

          Filesize

          4KB

        • memory/2140-23-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/2140-32-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/2140-27-0x0000000000350000-0x0000000000351000-memory.dmp

          Filesize

          4KB

        • memory/2140-24-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/2140-28-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/2140-22-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/2140-31-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/2140-25-0x0000000000340000-0x0000000000342000-memory.dmp

          Filesize

          8KB

        • memory/2140-33-0x0000000000350000-0x0000000000351000-memory.dmp

          Filesize

          4KB

        • memory/2140-34-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/2140-35-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/2140-37-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/2140-38-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/2140-39-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/2140-40-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB

        • memory/2140-41-0x0000000001000000-0x0000000001436000-memory.dmp

          Filesize

          4.2MB