Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2024, 10:58

General

  • Target

    772d1e30be68517c67a30704eccd9e0f.exe

  • Size

    240KB

  • MD5

    772d1e30be68517c67a30704eccd9e0f

  • SHA1

    d5ed02adc23f9e1601d98089ec12002eef64b5bb

  • SHA256

    40a0bf6f61cd510fc102dede2993c05d94b701e6e53ae31d0906acfb851fe236

  • SHA512

    eb0f1ccf0ce4353a38e516e6cc0e4f5b20b37ad94e800d43e247a1f9a8d1d199a13d0a23dce0d6a8fe5adc953632c57fbf8bf0e4e4270842c4e715987fa82c85

  • SSDEEP

    6144:tPe3dwqsNTNEXGlQR58EqxF6snji81RUinKq3aEESliDo:tUdQKjeaEEp

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\772d1e30be68517c67a30704eccd9e0f.exe
    "C:\Users\Admin\AppData\Local\Temp\772d1e30be68517c67a30704eccd9e0f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Users\Admin\beyur.exe
      "C:\Users\Admin\beyur.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2324

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\beyur.exe

          Filesize

          240KB

          MD5

          4ad4f6c9896b1bae4e3b0ec31a64c695

          SHA1

          0cc55876126eadd39521875e0379c5e0a895e095

          SHA256

          3bc5b9a9636eca02ea6c18aeba64002b1a7cb424be1554eddc09efc50936dc7b

          SHA512

          c1ed6911148807d46ccf88b23d4cb8471d3dba13c5d76c87bb61e256ca3ca6b3a5a497f124ef940e9fc87132ecb38168be032421fff08838333d59954de7df06