Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 17:06

General

  • Target

    750b99a6c6e28c229d1f2b5b5ae73005.exe

  • Size

    37KB

  • MD5

    750b99a6c6e28c229d1f2b5b5ae73005

  • SHA1

    0d93a2a4d0df8e52c9f2e2c28d7f0caba379b560

  • SHA256

    5e750fac586cda27ec22494b9af9d8cd3ffbad6eb5457ddcdad34e3db988d7ee

  • SHA512

    7de8043cc427532053746db354e4545349786c92e18299a59913283fe92dd55c5785b4ddec22fc3e17d5e60a9a169a481c20dffb88d7a824735453e85c998aaa

  • SSDEEP

    384:tX2feVkvXXmVMqrWmx9hlHEYUrvt9kceFdJIZQ4G0+5OIwktBs1Hf4ch9eMLMIgL:l27vHa3rrx3Z7JIZV5kuf4YkKMIR7L0

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 1 IoCs
  • Modifies Windows Firewall 2 TTPs 6 IoCs
  • Drops startup file 1 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\750b99a6c6e28c229d1f2b5b5ae73005.exe
    "C:\Users\Admin\AppData\Local\Temp\750b99a6c6e28c229d1f2b5b5ae73005.exe"
    1⤵
    • Modifies firewall policy service
    • Drops startup file
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="750b99a6c6e28c229d1f2b5b5ae73005" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\750b99a6c6e28c229d1f2b5b5ae73005.exe"
      2⤵
      • Modifies Windows Firewall
      PID:2540
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="750b99a6c6e28c229d1f2b5b5ae73005" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\750b99a6c6e28c229d1f2b5b5ae73005.exe"
      2⤵
      • Modifies Windows Firewall
      PID:2824
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="750b99a6c6e28c229d1f2b5b5ae73005" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\750b99a6c6e28c229d1f2b5b5ae73005.exe"
      2⤵
      • Modifies Windows Firewall
      PID:2892
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="750b99a6c6e28c229d1f2b5b5ae73005" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\750b99a6c6e28c229d1f2b5b5ae73005.exe"
      2⤵
      • Modifies Windows Firewall
      PID:2544
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="750b99a6c6e28c229d1f2b5b5ae73005" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\750b99a6c6e28c229d1f2b5b5ae73005.exe"
      2⤵
      • Modifies Windows Firewall
      PID:3000
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="750b99a6c6e28c229d1f2b5b5ae73005" dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\750b99a6c6e28c229d1f2b5b5ae73005.exe"
      2⤵
      • Modifies Windows Firewall
      PID:1048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2204-0-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2204-3-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2204-4-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2204-10-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2204-11-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2204-12-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2204-13-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2204-14-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2204-15-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB

  • memory/2204-16-0x0000000000400000-0x000000000041E000-memory.dmp
    Filesize

    120KB