Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2024 21:21

General

  • Target

    HA_EasyWmvtoDvd1.61_LRH.exe

  • Size

    4.8MB

  • MD5

    33cb5c0f4b4e76bfa011755c0e418228

  • SHA1

    34975350283a8f83dd26bf276adcb225fb47930a

  • SHA256

    5089149b4c6bfe0bc0e0fb3c923694e9c89334e8b871ad37a2d9ae2d3a5d9536

  • SHA512

    374f3e18bb03319355e6f0420807b28974e636051884b6acadb01dcc67c36fc20d37156c8c3793170f271292126aaa1076e8c808d4389412e4092a5e5d7d814c

  • SSDEEP

    98304:m9dEjjJKv4C/mjYKf6uS8s4XznVloFwix4fJAkMFcTDxe58lcE:7jJK7IHf6uK4XznX4wThmcXmZE

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HA_EasyWmvtoDvd1.61_LRH.exe
    "C:\Users\Admin\AppData\Local\Temp\HA_EasyWmvtoDvd1.61_LRH.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsy6682.tmp\ioSpecial.ini

    Filesize

    683B

    MD5

    55a566d9dee3122887e38b1736a69a7b

    SHA1

    4e208cad0919f8bd9482eff26d6ca016fe771cdb

    SHA256

    5bba7385d3ab5e05185a07de5770f1d722a2a54cb4d33631ac61aea001871344

    SHA512

    07bf99671dfdf86cc66b95144af353b3bd11d28c77d46ffb9dfe7a114ae896dfeb71ef1938d1d669ca0971f6fab378332103058d114a3687be05e7cfa9346614

  • \Users\Admin\AppData\Local\Temp\nsy6682.tmp\InstallOptions.dll

    Filesize

    12KB

    MD5

    83304a78d2b6ea45ea8404f4cd78721f

    SHA1

    d5c5d19653c751c08579dd094bcc9fef1841af00

    SHA256

    92344973083c0a5d8f5732814c1315124e8e0a2f1ed912583a081f95f7549414

    SHA512

    94076cc935927925641d668c19b389d007ff7e8623f2afe706fc73d1ecb97210577a828a727404b200d9870e14b23d6bd047de9201d629e7443a929c0740c67e

  • \Users\Admin\AppData\Local\Temp\nsy6682.tmp\brandingurl.dll

    Filesize

    3KB

    MD5

    9c3488b5e9655d1837c3963ecec33f70

    SHA1

    f0fa9b4c29e75c6e4419c4633d09f2797aee2ef3

    SHA256

    05ef4beb7fab9d04c1fb251874166fa2d73a34b4a7f2b145d37a2fd00c88979a

    SHA512

    6af9f88d65d2279a71620f2a656062b1737b3a9a1692ed4e5887bdee891ce08d21c5c0b25ab3acbe6da9fe255dcd7f8a517c2751e73dc56add216740c945e4a7