Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2024, 02:05

General

  • Target

    73732658650643a02049bd439e649d23.exe

  • Size

    6.2MB

  • MD5

    73732658650643a02049bd439e649d23

  • SHA1

    0053e7fd273f2e4c12dac95eedffa0f79a36b052

  • SHA256

    96ec2b2507de0bd5269ed6336214982170a1cace9e0ff1607b6aeb4fb5e8fe1b

  • SHA512

    d84d7469dc854146b7833d2e87919286062b6e41fbad5d269fdef278b943be496bc07f805be02f8d08037c08b579c0ebd8bd04d285fd10060272c2212e90e277

  • SSDEEP

    98304:XHqPmH+R2r4fFtmocc/v21KsSXLzOh69CBkvZcUf1aphMoRdKuIXBbvCwc:3qOeRrQlc/AV6uh69CBhQ1ghVRd8lCN

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 25 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73732658650643a02049bd439e649d23.exe
    "C:\Users\Admin\AppData\Local\Temp\73732658650643a02049bd439e649d23.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks processor information in registry
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2752

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\wrd-ac0-be4-f760924.~lk\0.mdd

          Filesize

          132KB

          MD5

          9eda6ac05d976773bec1a5ac2fc19c3b

          SHA1

          5885ea8e22e1d85b30e5e899c2f803c0212edccc

          SHA256

          47cc32f966ed28e1bd719faa6ce6d2919c4d447ef784b866155796ebb410ae0a

          SHA512

          21401d8c5336832d3603e596564065e20f178ec8cf5a983b232cdea97f1b5b55a6d3cfe141262e3680aa2caae8bcf9ec41d1db07e3d3edc243a7c308461975a9

        • \Users\Admin\AppData\Local\Temp\wrd-ac0-be4-f760924.~lk\1.mdd

          Filesize

          192KB

          MD5

          df9ffe8b2b937c3316bbead7821bee5d

          SHA1

          4d6cb8554e3f9f243a775e9f9b5e107e31ebe571

          SHA256

          4e760b339619cad772323203f2c9b4adc0c1e9b335f657afa0cb4087a036c42b

          SHA512

          1e1cd1cbf337557333e341459f80a28cbd68e8452fca3ea844726afd19463404bb60760b1b1e8dfb881bfa8bfed6fdc77b1c31a55b8f9f63dfb9d7ad9de704fd

        • \Users\Admin\AppData\Local\Temp\wrd-ac0-be4-f760924.~lk\2.mdd

          Filesize

          132KB

          MD5

          3a9fff286cf967cfd251324c83bf4921

          SHA1

          e0c90a51520ef36803469f3de79039db01cf49b9

          SHA256

          bed9643898f91e7bcc4d551ceff435c02d71867cc5a950b0de53489e26cb2155

          SHA512

          e772539f8f830d89797bd187dc07f1a66aea5aebcb7e8e2c569c8d53bcd19bb7deaf95c059c49c4d71dde8fdea07f0108e954b4cd966635881dc3e47bc62f4f0

        • \Users\Admin\AppData\Local\Temp\wrd-ac0-be4-f760924.~lk\3.mdd

          Filesize

          407KB

          MD5

          f8aa1f66f236ef14c1fcfd65e8558686

          SHA1

          e2f8958e6105013cb950b6223696c3aa3cb26092

          SHA256

          8630003c16ad1770d12cb4b8e72b14953923b387991eff97426ff87a4bbca73b

          SHA512

          ad40fe0e9925a52c2e8068d756a32551bdf4dea2f3485098b0548b8eaf128fd3c6f2237a5577ca51b0138df3c56975b033177f3d3b30c770364225e0cc6dc90f

        • \Users\Admin\AppData\Local\Temp\wrd-ac0-be4-f760924.~lk\4.mdd

          Filesize

          248KB

          MD5

          5379c9da4eecad6bd87e16fa9bf77793

          SHA1

          4952f040868210db520c15e2c948af48000da6b3

          SHA256

          f0466700070303202910c7e7b740d3a96750b0fa8a5b5b035d789d2815d49029

          SHA512

          a30f6a783377b932bd7c35194c883788ccde2f6040ae261d34aa22d93212a4f8184e9cf39208ddd52db23fb212a89757c1862df02bfc8ee90d61cca517485cde

        • memory/2752-42-0x00000000003F0000-0x00000000003F1000-memory.dmp

          Filesize

          4KB

        • memory/2752-40-0x0000000003500000-0x0000000003501000-memory.dmp

          Filesize

          4KB

        • memory/2752-20-0x0000000004DF0000-0x0000000004EE2000-memory.dmp

          Filesize

          968KB

        • memory/2752-9-0x0000000004970000-0x00000000049A2000-memory.dmp

          Filesize

          200KB

        • memory/2752-27-0x0000000000B30000-0x0000000000B31000-memory.dmp

          Filesize

          4KB

        • memory/2752-36-0x0000000000B60000-0x0000000000C60000-memory.dmp

          Filesize

          1024KB

        • memory/2752-45-0x00000000003C0000-0x00000000003C1000-memory.dmp

          Filesize

          4KB

        • memory/2752-46-0x0000000000AE0000-0x0000000000AE1000-memory.dmp

          Filesize

          4KB

        • memory/2752-44-0x0000000000A60000-0x0000000000A61000-memory.dmp

          Filesize

          4KB

        • memory/2752-47-0x0000000000D90000-0x0000000000D91000-memory.dmp

          Filesize

          4KB

        • memory/2752-43-0x0000000005D40000-0x0000000005D41000-memory.dmp

          Filesize

          4KB

        • memory/2752-0-0x0000000000400000-0x0000000000A46000-memory.dmp

          Filesize

          6.3MB

        • memory/2752-41-0x0000000000380000-0x0000000000381000-memory.dmp

          Filesize

          4KB

        • memory/2752-24-0x0000000004C80000-0x0000000004CC1000-memory.dmp

          Filesize

          260KB

        • memory/2752-33-0x0000000000A50000-0x0000000000A51000-memory.dmp

          Filesize

          4KB

        • memory/2752-32-0x0000000000A90000-0x0000000000A91000-memory.dmp

          Filesize

          4KB

        • memory/2752-31-0x0000000000A70000-0x0000000000A71000-memory.dmp

          Filesize

          4KB

        • memory/2752-30-0x0000000000A80000-0x0000000000A81000-memory.dmp

          Filesize

          4KB

        • memory/2752-28-0x0000000002D90000-0x0000000003064000-memory.dmp

          Filesize

          2.8MB

        • memory/2752-16-0x0000000004AF0000-0x0000000004B13000-memory.dmp

          Filesize

          140KB

        • memory/2752-10-0x0000000002D90000-0x0000000003064000-memory.dmp

          Filesize

          2.8MB

        • memory/2752-12-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

          Filesize

          4KB

        • memory/2752-57-0x0000000007440000-0x0000000007442000-memory.dmp

          Filesize

          8KB

        • memory/2752-14-0x00000000003D0000-0x00000000003D1000-memory.dmp

          Filesize

          4KB

        • memory/2752-62-0x0000000002D90000-0x0000000003064000-memory.dmp

          Filesize

          2.8MB

        • memory/2752-63-0x0000000000B60000-0x0000000000C60000-memory.dmp

          Filesize

          1024KB

        • memory/2752-64-0x0000000000400000-0x0000000000A46000-memory.dmp

          Filesize

          6.3MB