Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2024 11:59

General

  • Target

    722e63f8910e9fe1d7775c3a0495de54.exe

  • Size

    320KB

  • MD5

    722e63f8910e9fe1d7775c3a0495de54

  • SHA1

    88041f0b4f76532cdf45b48591f7953e83981070

  • SHA256

    fe893dcee37d4c6e62ec9afcf149062916a51af6141323ff74ae361a95105273

  • SHA512

    7f9f74da10056e30b86fe50d192c4c3410b7bd9c6429331980834571d04b9609174c240dca9512d933e9d8f051c4b567aefb2714868785907bd927a50a7c7a1b

  • SSDEEP

    6144:qCo86w8tceyv3WsJZAShsJduZKMjHaJUCo0nyglJ//MQ/81hpPbbcjdwEpqK:wLw8t/gGsIpduZJax/r3MQ/Msxw2qK

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\722e63f8910e9fe1d7775c3a0495de54.exe
    "C:\Users\Admin\AppData\Local\Temp\722e63f8910e9fe1d7775c3a0495de54.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\ProgramData\bD22003JeFjH22003\bD22003JeFjH22003.exe
      "C:\ProgramData\bD22003JeFjH22003\bD22003JeFjH22003.exe" "C:\Users\Admin\AppData\Local\Temp\722e63f8910e9fe1d7775c3a0495de54.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2816

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\bD22003JeFjH22003\bD22003JeFjH22003.exe
    Filesize

    320KB

    MD5

    8d78965462fb6b53dad06670d9ee299d

    SHA1

    db0d0277a876a2b896ffef35bd352f801fd3c5c7

    SHA256

    e6bd84837a9c23b6071fcfd4b1ad964c26e51ebaab8930503c0fd056d549e1de

    SHA512

    a811b3c32f6fbea431b9697515d0fb7ea64828d2da9c24cb99f3755ae73d61283c1fba05e8afbd6dc6f8ead97870b7ab3fbc72e17a6cd1e6fefa302449350955

  • memory/1520-1-0x0000000000400000-0x00000000004C3000-memory.dmp
    Filesize

    780KB

  • memory/1520-0-0x0000000000400000-0x00000000004C3000-memory.dmp
    Filesize

    780KB

  • memory/1520-3-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB

  • memory/1520-2-0x0000000000400000-0x00000000004C3000-memory.dmp
    Filesize

    780KB

  • memory/1520-9-0x0000000000400000-0x00000000004C3000-memory.dmp
    Filesize

    780KB

  • memory/1520-36-0x0000000000400000-0x00000000004C3000-memory.dmp
    Filesize

    780KB

  • memory/1520-52-0x0000000000400000-0x00000000004C3000-memory.dmp
    Filesize

    780KB

  • memory/2816-28-0x0000000000400000-0x00000000004C3000-memory.dmp
    Filesize

    780KB

  • memory/2816-37-0x0000000000400000-0x00000000004C3000-memory.dmp
    Filesize

    780KB

  • memory/2816-49-0x0000000000400000-0x00000000004C3000-memory.dmp
    Filesize

    780KB

  • memory/2816-56-0x0000000000400000-0x00000000004C3000-memory.dmp
    Filesize

    780KB