Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 12:23

General

  • Target

    58e8762d00486fa09a0b924601f87851.exe

  • Size

    14KB

  • MD5

    58e8762d00486fa09a0b924601f87851

  • SHA1

    ebcf1d5e36cad6272aa2c49cbace19834e3f949a

  • SHA256

    2fb9eb1508f0bf4ff36993e56cb45329def23ef6eed215a09e2f3715f6e467a1

  • SHA512

    71eadc0808e55f93ace5d49947da21f8b2be10ce7c235f14dcad6b12375e718caece23d964fdfbbe1920a6be55a85c8b57b5d4bf078dd52d0f18a9c61059269d

  • SSDEEP

    384:emWDlkSA2Ji8MJpHX7P8dE00zK2Ge3jnlc4eYsel:emQfKpHuEZzKZcrlcjYvl

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58e8762d00486fa09a0b924601f87851.exe
    "C:\Users\Admin\AppData\Local\Temp\58e8762d00486fa09a0b924601f87851.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\C553.tmp.bat
      2⤵
        PID:2348

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\C553.tmp.bat

      Filesize

      179B

      MD5

      ceab7ba67dcfd806a2ead607d24ed171

      SHA1

      37cb8f02a90df806e7586b97824ffd48eabce917

      SHA256

      972b0f0dd3717a7f7dd4807589803f84764a958fa841e3e8c91d8bd13aef50aa

      SHA512

      e269e902fc30afbeae36508f85b98bddd5acec64b5bcdc927d74ac8e209adaf6bd142f4e2095df7d66282a5ff5642048998edca203af08c30a11409e66d79420

    • C:\Windows\SysWOW64\adsntzt.dll

      Filesize

      1.0MB

      MD5

      50fc46b0de7ddcf686e7010e2c056b10

      SHA1

      04fe9defcbca95d60639b89deaba8dfaae49f0bc

      SHA256

      e2a4fd9a57ffb31de5168843e19d2fe81c7cf4cbed2db1138486fa3e161c1075

      SHA512

      3d89b8943a2ed5217d7abe45ab87b2e954b8bef9dfc084d86c15884cdff9c279d137f17677e8cf559a9ca13ddb043f5f10a05d8bb9401e92506ddb778450ff51

    • memory/4616-6-0x0000000020000000-0x0000000020008000-memory.dmp

      Filesize

      32KB

    • memory/4616-10-0x0000000020000000-0x0000000020008000-memory.dmp

      Filesize

      32KB