Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2024 09:23

General

  • Target

    76fb2324ee40ca33b3df7cf420e3cf36.exe

  • Size

    227KB

  • MD5

    76fb2324ee40ca33b3df7cf420e3cf36

  • SHA1

    354d79da5baf1d68d46bd83dff46cfb302dfe132

  • SHA256

    6a4ff569548cabfc375de0b4b69a29482a140929092852179f7086eac405059b

  • SHA512

    b992e9a22df036d0681b65fe6a956071d4d957c6a17c40dcdf8861fe5546201f68c7079ca15853a1f51b1c151a6966af426147af28b2c9adf65f0df261690ad3

  • SSDEEP

    6144:jzOdykKSsvop14HAZvMy75KGsQK6tWwcRBiwxDXDy5yMt:jzOJKSOBAt7s5M6nHDXO5D

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76fb2324ee40ca33b3df7cf420e3cf36.exe
    "C:\Users\Admin\AppData\Local\Temp\76fb2324ee40ca33b3df7cf420e3cf36.exe"
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Windows\Dtadua.exe
      C:\Windows\Dtadua.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Dtadua.exe

    Filesize

    227KB

    MD5

    76fb2324ee40ca33b3df7cf420e3cf36

    SHA1

    354d79da5baf1d68d46bd83dff46cfb302dfe132

    SHA256

    6a4ff569548cabfc375de0b4b69a29482a140929092852179f7086eac405059b

    SHA512

    b992e9a22df036d0681b65fe6a956071d4d957c6a17c40dcdf8861fe5546201f68c7079ca15853a1f51b1c151a6966af426147af28b2c9adf65f0df261690ad3

  • C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job

    Filesize

    344B

    MD5

    83dd1d7d55e44f96757040cf58832355

    SHA1

    3840b8dff16ee0874693b77b9f9cf972bad42e43

    SHA256

    ced81b3657a8ef00de61963e95235df33bca02758c8759f876efce7a547e1bb5

    SHA512

    c9ab89aaf4cbf3a3ac28065eb493f7c8ea46e324093cb1233a23a1f258311d6211a0c3b64f40ad218fcf69ebe281889dc2cd3da08cfbef1bc222f0c83fb850d8

  • memory/2144-11715-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2144-2-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2144-1-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2144-0-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2144-40852-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2244-9-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2244-32781-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2244-53474-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2244-53475-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2244-53476-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2244-53478-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2244-53482-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB