Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/01/2024, 08:51

General

  • Target

    5ad0d2bbbf8af4d39c03ecee0eb3572b.exe

  • Size

    228KB

  • MD5

    5ad0d2bbbf8af4d39c03ecee0eb3572b

  • SHA1

    d4d08194ac46d819149eebd5bd2c4dadf5dc0951

  • SHA256

    45447b235f22602853d710d75deba968b9a9e60f565313a742a2ac89bab4d91b

  • SHA512

    1c6374fb45a4f6f9f6092a59e16e5deb0cbbe9fec0a75f2952e14429ff1d54d7274958ef4ccf974408814c9f3d6290d82a8a82eced9a3d2e37b0d5e21b7f4f25

  • SSDEEP

    6144:DmwO3PFKs7aFwKWwalhrEqxF6snji81RUinKZHg/7SE:Dmw8PhAmZIH+7x

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ad0d2bbbf8af4d39c03ecee0eb3572b.exe
    "C:\Users\Admin\AppData\Local\Temp\5ad0d2bbbf8af4d39c03ecee0eb3572b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\biiakal.exe
      "C:\Users\Admin\biiakal.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2168

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\biiakal.exe

          Filesize

          228KB

          MD5

          f17c20090360f317119fec588df03d6a

          SHA1

          b341d3a1ce60d7d332680e71091c9f10e7c6964b

          SHA256

          8fd623e2570674590942e0abf773231b9edc37ed7c2c5dfa52e87910a6c39124

          SHA512

          5990aff2c79a919d3cc6b1e5c6b53ae19417051de143acdce11ba203375706e70cd01bc4e26173ef0bbcc514a4f9b77e79c67979fea142f358eecf94b3e11ebc