Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2024 12:35

General

  • Target

    7d2564fd91b3d55cc05444e5ecd130b9.exe

  • Size

    14KB

  • MD5

    7d2564fd91b3d55cc05444e5ecd130b9

  • SHA1

    15e8b093cc16e88896075d53f1ffa5f6471dde98

  • SHA256

    9ad8c1076f01d08ecb43551e1deb7661c9835504ddd3dba2b4715c43b3b5a011

  • SHA512

    9b2050d9e750ec7e2117137520cf9ba5d0a920a54a2a256f446cb34a3f9e2dd7c0d9b711bba78b534579d72835b490a61bd33672ddf3c37f86a2ac2533d02556

  • SSDEEP

    384:5iSFwTQthMrlZzyhWmB8dsxwf4XfSLNlZ7:5RF9ilZ2PB8dQw22b

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d2564fd91b3d55cc05444e5ecd130b9.exe
    "C:\Users\Admin\AppData\Local\Temp\7d2564fd91b3d55cc05444e5ecd130b9.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5024
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\E196.tmp.bat
      2⤵
        PID:752

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\E196.tmp.bat

      Filesize

      179B

      MD5

      1c205466e4a81981e487ad70fe9b0aea

      SHA1

      64993681e5fdba9ae3b0a1bbb3ae995c038b9dc2

      SHA256

      165a67a042fb550c711582dadf74d6212adcba26d131c6734c0b48997a089765

      SHA512

      404932a85f33463610f1d423ea8feee9d73b1da2e0b892f2196450bc0dcba1140c54157a45eb9f5206d48637bdf9c6933c39fa252713c37f039e9820ee759d02

    • C:\Windows\SysWOW64\catsrvwl.tmp

      Filesize

      955KB

      MD5

      bd96454d944af64b27bac3c551bb4a47

      SHA1

      1bbc0c8f4480f570d34da2b840543dfeeca169d5

      SHA256

      edd97e3177caf66a944e46b2af920a2b12dfb68e24d212c833376d35be9dd884

      SHA512

      a57885ecb0494195dd4aefbdf51827e6bdf4079ad39774013731953f23aa0c6b8561f48672b34ebcfe0c466f14cdf5b7d272216cf6c830ff4cd255e2199be603

    • memory/5024-17-0x0000000020000000-0x000000002006C000-memory.dmp

      Filesize

      432KB

    • memory/5024-21-0x0000000020000000-0x000000002006C000-memory.dmp

      Filesize

      432KB