Analysis

  • max time kernel
    97s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/01/2024, 02:26

General

  • Target

    5a091ea2cc8a4d87bbb16e21b0d36d4b.exe

  • Size

    76KB

  • MD5

    5a091ea2cc8a4d87bbb16e21b0d36d4b

  • SHA1

    0a4dfa6895579b19e14ee4f2788e4a13f87c9860

  • SHA256

    f5db7aea319521b7e8da109b8f7c33a55ddcaefd8e728501089d387f25d00415

  • SHA512

    18e5da6988164d95d47d90d8d825a0266259ca000a285670d73d54639882aa09036069a9ddf28f5d3bf37fdf17f5668e4cdd72a63bcb3a91bf3949af504111b8

  • SSDEEP

    768:UpP4fR08PWIS0MUe9N5U2b1CY/g/7Gr8Q/apUZlrTVU9yu1uOpaV+:UiMX97P1CgY74lrTVU9yu1uOI+

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a091ea2cc8a4d87bbb16e21b0d36d4b.exe
    "C:\Users\Admin\AppData\Local\Temp\5a091ea2cc8a4d87bbb16e21b0d36d4b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Users\Admin\ceuicef.exe
      "C:\Users\Admin\ceuicef.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ceuicef.exe

    Filesize

    76KB

    MD5

    a749803a0e558eac5aa119297a697826

    SHA1

    37a56ea02fa71d8a5eeb2ca3e4dc1a8987aa2d7f

    SHA256

    3a2c920de1b991a9d9ac3be1822b5a4264f6f8d038bd01debea71a06cb8cfd9b

    SHA512

    72f38cb310b5d521f98e37848cead13d0d7b22a6af678f6ac7ec28f148c867ad385fb0382f9ff45e0b58b4fda9aaa39d4130abd014fd4e47c2dcd2784b6c5971

  • memory/2720-20-0x0000000077760000-0x0000000077870000-memory.dmp

    Filesize

    1.1MB