Analysis

  • max time kernel
    143s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/01/2024, 13:18

General

  • Target

    5b54943a7e20f8ae65bf06cc932a2cba.exe

  • Size

    2.7MB

  • MD5

    5b54943a7e20f8ae65bf06cc932a2cba

  • SHA1

    14f2735cb23eb657232adbee66ac383a1ce093ca

  • SHA256

    6c3ff8a91d6a6df9352489be1700475528af64cec22fbcfd5c9cbe6c862c3441

  • SHA512

    ad8320e0fbeb3baf200913bc01aad6b9769545daa7f9497ff09fec26b10c2e2979b5b48885f1e5880a11613df321906a69ca0962b79ad54b1ea1f5716ff48ac4

  • SSDEEP

    12288:9lhTqkew1rdDJ+3seY8laVi6ZjdIrmTHSbkamx6t/WQnezoSR:9KkdPeNs0e3HqROhj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b54943a7e20f8ae65bf06cc932a2cba.exe
    "C:\Users\Admin\AppData\Local\Temp\5b54943a7e20f8ae65bf06cc932a2cba.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\sEUpm.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svchost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\vvn\wjWmZa.exe" /f
        3⤵
        • Adds Run key to start application
        PID:2120
    • C:\Users\Admin\AppData\Roaming\vvn\wjWmZa.exe
      "C:\Users\Admin\AppData\Roaming\vvn\wjWmZa.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Users\Admin\AppData\Roaming\vvn\wjWmZa.exe
        "C:\Users\Admin\AppData\Roaming\vvn\wjWmZa.exe"
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        PID:2688

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Cab70A0.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Tar7100.tmp

          Filesize

          9KB

          MD5

          931f59968d1fda6fde19c00af02269da

          SHA1

          237abe6a0f500581234e0ddb3a613c860501bafc

          SHA256

          db7e91c7c1c55d48d095e3007c7f1f4c33b6f1690e029f3f477355422cbe5da6

          SHA512

          38bfb4d56299b1819e89ac7e1abf4dc29fee3ecb228e406a4bfb60fdf6f150250755c7163f35466a0be910983faa6384fc32b71e1c1874496d8b70c6f7142df2

        • C:\Users\Admin\AppData\Local\Temp\sEUpm.bat

          Filesize

          137B

          MD5

          207bacd6dabb769f3c2751f74a59e2aa

          SHA1

          c081965aabb0e16aaac584b08820d4bd6b2e40a6

          SHA256

          7b92b3818a50b0ae978fb035bedea2f42b097855fb2ac1ac8482c2b8e5cdbe91

          SHA512

          4e2c1042950b99a101b18c7b7361b0b09be9a9bef1f91ec1abaa6ea6408905729d1d52c41f5e9a6b035b938286cdb8f96e8f5871060ae4c56d7846e7673d67a2

        • C:\Users\Admin\AppData\Roaming\vvn\wjWmZa.exe

          Filesize

          1.7MB

          MD5

          d76717588b0dd35c51e0379dfb55b582

          SHA1

          53603cd72058c8ae3a71bef0b9ee8bc06875d260

          SHA256

          89833ab92e4eefd7261b19bbb5c0715f17827f109e686fdfb938b5ff3c2b88f6

          SHA512

          d47009eca4ea88e1ea47697f48cda6652e0273bdcfedabeac67962641f7860ebb63d815aa7cd5109b8dde2417d09f12b472bce03c0577ca1dcba44ddf5c9b7df

        • C:\Users\Admin\AppData\Roaming\vvn\wjWmZa.exe

          Filesize

          980KB

          MD5

          5fd462c588504292894f1d464d875239

          SHA1

          963446671c1763620f330fe875eeb2259ed3a9c1

          SHA256

          144cb776420918c6f8a7213835c439e41e67f35f914d0c2999791337b9cc8c1e

          SHA512

          f938512941c8abc7d21c136aa2e38e542d68bce1389cf27b1239a490bb8429226bf9613e9101d64f4537695e8033f8b61b8fc0717c9787ff9e20124181ce6973

        • C:\Users\Admin\AppData\Roaming\vvn\wjWmZa.exe

          Filesize

          700KB

          MD5

          bd6acd054d0bcdbded38fdf6d35637b7

          SHA1

          df4539c7070cd9dda8bdc815c42d9f7855931603

          SHA256

          432d4f3310b31632e8fba18947edff1be20da952a1d0a613c5a1dbdbcd46c9e2

          SHA512

          ae57ddb169913b8f5cf6e11ea1a35f44059083e1ac47e29d7ce395e8138061cdc60a49b4e69c0640e550fea82a4e4da0470f70b38f936c2272b4a529d5548a66

        • C:\Users\Admin\AppData\Roaming\vvn\wjWmZa.exe

          Filesize

          1.2MB

          MD5

          6d4c74aff2ea576aa91932cb35b37bcf

          SHA1

          e8403421769573ecdd4f69086385fcc6520807f8

          SHA256

          b06371e0338c13f2fa6379861b44bb6388b2f06c7f48452ba50df22f3bb3fad9

          SHA512

          8249a50378d3ba27b42eda1f8f95da00fa022408bc6b38762a8f6bcc0c9133dc0d2a2839bbceae0df3eb49cea926bbf8ba1aa6d471e0d948e23b0473a18080aa

        • \Users\Admin\AppData\Roaming\vvn\wjWmZa.exe

          Filesize

          128KB

          MD5

          12b08d60901b84398a3f5f0cd6623853

          SHA1

          ddd5329dc12201a5a615accc32c7aa3033eca4a5

          SHA256

          f6dbc554ae6e1f76524fa6ec1b79906fe378eb55098872ca006b94efd159a253

          SHA512

          95eedb479fa1058bf5c03fa4216f8414f1e6e76246edf81c6b9b02400fe1722291cf0afaf1925b57c5a8f488cf4d4c0ad8daf3283c1682acc2fa78b58a214f14

        • \Users\Admin\AppData\Roaming\vvn\wjWmZa.exe

          Filesize

          1.8MB

          MD5

          7717f47753e28919428aa25ae7846adb

          SHA1

          56df0b5a0cca3d1598cf0b299cef57d626db5a38

          SHA256

          d729bbdb093f5cd40e4dd606480a1dc76718936b456f376659d0176f6a32571a

          SHA512

          2dd9e06a055713e9af4f349fc67a2f8e0277312a7925d87605eb8a9c4935194016d0b0684c77b26ffcc370b9b2670599dc85d652b441b67b9fcd7cb7a9e9e902

        • \Users\Admin\AppData\Roaming\vvn\wjWmZa.exe

          Filesize

          1.6MB

          MD5

          87d06c117cfa9abb773733dcf92aeb92

          SHA1

          0ffa6916f2eab24457cdf016ce3cb6d2cb02a189

          SHA256

          f4cf6e23bd6b38345704e99f3ba5802c440ab66d65b9a0db4719109dcad7536c

          SHA512

          eb51d92344bbf167a9c213edff5027b5da6a14d8d2c5940fd8d875dd732a4acb5077faf75b02916f129589df0da062282b3dad07c6bc30c3bef768ca748ea809

        • \Users\Admin\AppData\Roaming\vvn\wjWmZa.exe

          Filesize

          996KB

          MD5

          ac0917443b325d53e9430d5acbfce220

          SHA1

          2eccc05886a8adb6248e5463ea155d9572847c42

          SHA256

          e212e31977cd8866db908092a778aa11181587683156f0b8911e9b5583c810bb

          SHA512

          05453e79e873c59beacb3c7c29d2460f8bff01061bfa7e10b8079c21572af7d59a5680a336dc9b6eec230d9d62b68c807be6ab20b279c42e6e8e32b0e25531d0

        • \Users\Admin\AppData\Roaming\vvn\wjWmZa.exe

          Filesize

          1.2MB

          MD5

          cd8bafcf2c0f571f6b816661b9569732

          SHA1

          47df1a28b04cd35df5e62c4cc913e127bfc26336

          SHA256

          f57dd31c86c89fda80824fa34db3da73e27b5e6ff73a10895c3d8c6cebfd3675

          SHA512

          61eee9e02570a72e7f27e89246872704e95b17d639d8b2c204d3a1ca56359e4e5445d49554f4693d593a5e521167aef45666b6ce263001f109a9cbb63e5f008b

        • \Users\Admin\AppData\Roaming\vvn\wjWmZa.exe

          Filesize

          1.2MB

          MD5

          a20c2b6b098e18c57ccc29308a3311bc

          SHA1

          bfe52f9459cc6a6b93c9b49ebe7eaee0e008d83b

          SHA256

          1da06bfb0b0890239b6efddf44632a59135f66ea7b40790275bb4ee1881b02a5

          SHA512

          1d8cd2b56d8e1ef858f8b5efa8acb1378a221e97150eb539dcf57950876b42064c6c53926d4bdda1d7b1c26551f914f84dc271d7b2f7cee90ca5601832cf0acf

        • memory/2216-37-0x0000000000400000-0x00000000006AD000-memory.dmp

          Filesize

          2.7MB

        • memory/2216-38-0x0000000002EB0000-0x000000000315D000-memory.dmp

          Filesize

          2.7MB

        • memory/2216-0-0x0000000000400000-0x00000000006AD000-memory.dmp

          Filesize

          2.7MB

        • memory/2216-35-0x0000000002EB0000-0x000000000315D000-memory.dmp

          Filesize

          2.7MB

        • memory/2216-34-0x0000000002EB0000-0x000000000315D000-memory.dmp

          Filesize

          2.7MB

        • memory/2216-113-0x0000000002EB0000-0x000000000315D000-memory.dmp

          Filesize

          2.7MB

        • memory/2336-41-0x0000000000400000-0x00000000006AD000-memory.dmp

          Filesize

          2.7MB

        • memory/2336-48-0x0000000000400000-0x00000000006AD000-memory.dmp

          Filesize

          2.7MB

        • memory/2688-44-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2688-112-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB