Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 17:21

General

  • Target

    75145cfcdc40a1a2ee2551dd30240d1e.exe

  • Size

    182KB

  • MD5

    75145cfcdc40a1a2ee2551dd30240d1e

  • SHA1

    e0e97d6e29595a9a5ac83a2525de7b6e5dcfdc44

  • SHA256

    1dad555868fb85e269d9994f68e087f98336f15af08a05d6c23147c13f87ccdd

  • SHA512

    ded617bc726d202428fcf421363f450a0363f7d9b4467fe66943123877aa3c04e5bda0af38915ba40c723323c28667b34574d5d8376b653c8e9e8dc57523dac3

  • SSDEEP

    3072:iRgUWzXJQ00rdsURPfDVZ4hM3M97DEOeFSwSYU4jUcD2r3Vt:X/u0SmUeCq7DcYw24jPqr3X

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75145cfcdc40a1a2ee2551dd30240d1e.exe
    "C:\Users\Admin\AppData\Local\Temp\75145cfcdc40a1a2ee2551dd30240d1e.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2400-0-0x0000000000400000-0x000000000057F000-memory.dmp
    Filesize

    1.5MB

  • memory/2400-13-0x0000000000400000-0x000000000057F000-memory.dmp
    Filesize

    1.5MB

  • memory/2400-23-0x0000000000400000-0x000000000057F000-memory.dmp
    Filesize

    1.5MB