Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    15-01-2024 05:41

General

  • Target

    5c476b47ecc73dbd3412c5d37676f6f9.exe

  • Size

    2.5MB

  • MD5

    5c476b47ecc73dbd3412c5d37676f6f9

  • SHA1

    5c5bb58226cc903fb5b230d2fe0359f017dd1772

  • SHA256

    bacf1ae72d809382dc9ceba302a3f1fc91542620767e9d34e5caab2a2619e133

  • SHA512

    f713ee497720206a33880186fef7eec169911b258c052b7b9e0e4b3a9f259e0ed4ebf4f4249449b7068870ea167fb5558287c88136a9bdd6a1655e98fec76f1a

  • SSDEEP

    49152:j0Ii8g9VPJlLQBkK8q3ws6krWiSERpTT8TnrKPMaU9R0Q02p+4:wIi8g9BMBLVWixrsTOvIJ

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c476b47ecc73dbd3412c5d37676f6f9.exe
    "C:\Users\Admin\AppData\Local\Temp\5c476b47ecc73dbd3412c5d37676f6f9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\temp\TeamViewer\Version5\TeamViewer_.exe
      "C:\Users\Admin\temp\TeamViewer\Version5\TeamViewer_.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsy4378.tmp\environment.ini

    Filesize

    661B

    MD5

    d49491c7ba7bd565e1b8ff473cd84c8e

    SHA1

    2522272cf01af17f8ace15a29759f7629ebdc94e

    SHA256

    0be1c22c6f540d98cd55d7f434f57aedffc67a19df4e4957f75eb034a7b3d9bb

    SHA512

    2207da44794bd8b8ed1161a0a1990d13824c91b651711d20fbd14769f898a95168884e217f24465b309901215961f3bcb287214b61c5ce2fbc020e8e21cb7b3c

  • C:\Users\Admin\AppData\Local\Temp\nsy4378.tmp\host.ini

    Filesize

    975B

    MD5

    69a491a30f8fd22d3210847d54274a19

    SHA1

    7e19eb2b1424bb487708f91001d0a001e214ebb8

    SHA256

    49a8ab22496032d8286c7fa71d1e5fc3f13079572d45e4140d1b24be57202b53

    SHA512

    4ac8b38c91eb466cc31e8256cd7a59bf10ff088a3ff233510277be969134c7da2c784fb1254323c2a3e502d2daa98561c160d321a153914b65f97c6bec79207b

  • C:\Users\Admin\AppData\Local\Temp\nsy4378.tmp\start.ini

    Filesize

    1KB

    MD5

    1f32f636bcedeb37a7913e76fc000a51

    SHA1

    5232af60428db5dc5b32bd218330966cc71bf06d

    SHA256

    43edfbd7e7461241b61aadccf1629bf0694501b675433544b44a84866a3f5226

    SHA512

    2a1509abf3ea24f35db5e9b123f23dfdb9e9f4c83b50a12a9821b7323731bfedd8cd8967931433b62d937218aac50fb34772597ba7df17aa214d878b6c7bd1f1

  • C:\Users\Admin\AppData\Local\Temp\nsy4378.tmp\start.ini

    Filesize

    1004B

    MD5

    3b52a6054afbd25bd44d2408cb0434d1

    SHA1

    5d625fdeaad64f68d34c68dd1c34c63baf4a71f2

    SHA256

    d47b487080592c3680f94d60721e8c75fc0f728d7c039dca4c45a5ce4fbf5e46

    SHA512

    d5ffb7e9aaad4cee74758b77be84ab6aa5366a6d01c9316f1b5d79bb09bb36c762a1aa857e8c5570997d925d7198be6447a8663e721b46f0250008a86b99c6ba

  • C:\Users\Admin\AppData\Local\Temp\nsy4378.tmp\start.ini

    Filesize

    983B

    MD5

    cc38fe264db13629dbac09fb999f4f7f

    SHA1

    51db7d5f9fa53ae98856575b55c4d69ee0cfc6b0

    SHA256

    0ebbe20b46d7cb70a57c730bf65f73c219c03a0bcffc36fa7a4adefd2623141d

    SHA512

    fbb4ef383b4a4b18f0fac1dede037213ffd16f8bd9a98e4d326817953b2b2ce577f4a5696cddbbf4a84a595cf1dc85e4b0501cfb988eac909f698789e73033e5

  • C:\Users\Admin\temp\TeamViewer\Version5\TeamViewer_.exe

    Filesize

    263KB

    MD5

    7013cf59244be19076328d7ce9b29220

    SHA1

    3b37e50d836f201e7a74366c95b5d1a26c40aac7

    SHA256

    01cd322c7f3c86609bd71c3e3b4efae273c2bc40826c47f8befb4abcbdbfa9bd

    SHA512

    0534f08c1a659413482fbc0601ef360645834f4c831befc950a2b2c15e5e89c6f334f475545a619249d1f8c9ecfaebe9f08de249cfd2dd1a6aff40ce386d3f60

  • C:\Users\Admin\temp\TeamViewer\Version5\TeamViewer_.exe

    Filesize

    327KB

    MD5

    e4c06a19aff9d315c829cd2188678499

    SHA1

    bd76c76935270a3b826be2620c426e5764c94d36

    SHA256

    e129b36461ae4994e322a90a9903896525df93daf83975b501e4bad9907e786f

    SHA512

    2373f915d1c0ceb8eee79620c4740582c4ed399d2c0d34b10fe7883d9cb7bc1463e228a88cbb9e6f8d901827f6729afcd96b77149646d9ea2a299e2d81d95fd8

  • C:\Users\Admin\temp\TeamViewer\Version5\TeamViewer_.exe

    Filesize

    241KB

    MD5

    93578b3fac4ebfea802c235fb6652862

    SHA1

    56448d5f80286f28ca71526b5d45759c81056d39

    SHA256

    efc3be99138663dd0cf3e0a6d58f097c6b8ac2353d5980483f46677076db624b

    SHA512

    82428214736970cd3dfd56247a22972c815fab96a55e80638a39680899c7d88013eae0f953ec933c8cf86a027f1320a3e94cc7178897c9e614ac92157fc22640

  • \Users\Admin\AppData\Local\Temp\nsy4378.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    0dc0cc7a6d9db685bf05a7e5f3ea4781

    SHA1

    5d8b6268eeec9d8d904bc9d988a4b588b392213f

    SHA256

    8e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c

    SHA512

    814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0

  • \Users\Admin\AppData\Local\Temp\nsy4378.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\nsy4378.tmp\TvGetVersion.dll

    Filesize

    13KB

    MD5

    eb062eb8b2c498c03b1542ccde87ad90

    SHA1

    44432fa3d16baa6bd5243fab7187204d4c0a2166

    SHA256

    81888a1166ae594aef28084d00c5d59e899e8f0b6bc632f99df08fba3ad77c3b

    SHA512

    e21af0d46cb71ecbe764915fc9ef67ebbe3c0dd428b4816adb7e966aafb761aa72248a21392236bf4ce068be855e9a43f3ccf96db612edef3cb17e1a10afe4e1

  • \Users\Admin\AppData\Local\Temp\nsy4378.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    1e8e11f465afdabe97f529705786b368

    SHA1

    ea42bed65df6618c5f5648567d81f3935e70a2a0

    SHA256

    7d099352c82612ab27ddfd7310c1aa049b58128fb04ea6ea55816a40a6f6487b

    SHA512

    16566a8c1738e26962139aae893629098dc759e4ac87df3e8eb9819df4e0e422421836bb1e4240377e00fb2f4408ce40f40eee413d0f6dd2f3a4e27a52d49a0b

  • \Users\Admin\temp\TeamViewer\Version5\TeamViewer_.exe

    Filesize

    357KB

    MD5

    844d5e0e0f3cbca18a733e148bacd36a

    SHA1

    bedeb9bafb35e9bb1889956f769e567f3d700426

    SHA256

    77b0a975b68693f255fa901f76fd8b65e38c96b547586812f954a5fa0741e0ac

    SHA512

    d9da73624a8f8ae3e96e991cc228f107f7290f8001c33a2b5f4846753f9a758bf144ca584f7510f057f1ead9cc203045e463aef40d05bfc573f6ed58e1e14451

  • memory/1256-10-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1256-0-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/1256-6-0x0000000002EC0000-0x0000000002F09000-memory.dmp

    Filesize

    292KB

  • memory/2192-11-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2192-226-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB