Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2024 12:35

General

  • Target

    7d2564fd91b3d55cc05444e5ecd130b9.exe

  • Size

    14KB

  • MD5

    7d2564fd91b3d55cc05444e5ecd130b9

  • SHA1

    15e8b093cc16e88896075d53f1ffa5f6471dde98

  • SHA256

    9ad8c1076f01d08ecb43551e1deb7661c9835504ddd3dba2b4715c43b3b5a011

  • SHA512

    9b2050d9e750ec7e2117137520cf9ba5d0a920a54a2a256f446cb34a3f9e2dd7c0d9b711bba78b534579d72835b490a61bd33672ddf3c37f86a2ac2533d02556

  • SSDEEP

    384:5iSFwTQthMrlZzyhWmB8dsxwf4XfSLNlZ7:5RF9ilZ2PB8dQw22b

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d2564fd91b3d55cc05444e5ecd130b9.exe
    "C:\Users\Admin\AppData\Local\Temp\7d2564fd91b3d55cc05444e5ecd130b9.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\A525.tmp.bat
      2⤵
      • Deletes itself
      PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A525.tmp.bat

    Filesize

    179B

    MD5

    1c205466e4a81981e487ad70fe9b0aea

    SHA1

    64993681e5fdba9ae3b0a1bbb3ae995c038b9dc2

    SHA256

    165a67a042fb550c711582dadf74d6212adcba26d131c6734c0b48997a089765

    SHA512

    404932a85f33463610f1d423ea8feee9d73b1da2e0b892f2196450bc0dcba1140c54157a45eb9f5206d48637bdf9c6933c39fa252713c37f039e9820ee759d02

  • C:\Windows\SysWOW64\catsrvwl.nls

    Filesize

    428B

    MD5

    9236c98111edb589c4793af7237eb94e

    SHA1

    e9c15be1e3574bc319be7c871648c8f748166881

    SHA256

    a795f0005cc05e6e4c2be2a3b991a1d9ef08492caea1eb6d8cad1c07c1b7ae0a

    SHA512

    d3f4a30deafe29e6078a9f28c8398ab32121d257f91532597ad88a25c99d01cb12c0bf39331590a589ad2230b0a96f9830210b25426c21fd0822c6763f6a68ba

  • C:\Windows\SysWOW64\catsrvwl.tmp

    Filesize

    891KB

    MD5

    843e4fdc2affa2d5ecfc0756b0afac49

    SHA1

    1865124ae42fab6139d96bfe1d8f9f6583b2c450

    SHA256

    b2a79e2f110ec52574fca7fe95b55e74c8f2ccc6b311c9a7abfbef01602f63b4

    SHA512

    8114093e82c25e377753bfc5a0f53aaaec7db9f5e9d72f6871cfe2e375bb88199dafd0e219280af44e0c16c76f08f791f40633940a93ada52f21ac140ff02199

  • memory/1432-16-0x0000000020000000-0x000000002006C000-memory.dmp

    Filesize

    432KB

  • memory/1432-25-0x0000000020000000-0x000000002006C000-memory.dmp

    Filesize

    432KB