Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/01/2024, 04:01

General

  • Target

    a6fc2d8611cae0eda7fc1b53495a6b3b.exe

  • Size

    3.3MB

  • MD5

    a6fc2d8611cae0eda7fc1b53495a6b3b

  • SHA1

    0a8a58bc8bfa8eeb98dca98af8b55aa780f52b10

  • SHA256

    7361df98c7cd1e56e0345e61cf68c1d5818d4064269f9b234511c7060e97ad9f

  • SHA512

    0d519183d97402f68f4db2df3955cf2aa7053fa1546392acc3e13532848bc6aab8a73d2e30165f2c88c6640ac815a285280cd2cff4bd48440bf2568e130468ce

  • SSDEEP

    98304:qi++qX8iuivYw7Kx0tJI7dKeZICTTTr1jjxS:xcNuyYw7RtJI7ZZhTTtjQ

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Registers COM server for autorun 1 TTPs 11 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 22 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6fc2d8611cae0eda7fc1b53495a6b3b.exe
    "C:\Users\Admin\AppData\Local\Temp\a6fc2d8611cae0eda7fc1b53495a6b3b.exe"
    1⤵
    • Loads dropped DLL
    • Registers COM server for autorun
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsi3479.tmp\Checker.dll

    Filesize

    41KB

    MD5

    15d08cdf9b65dd72719cba1465e43739

    SHA1

    49023d696e3fe9141f22a4b88e67f1e05deaacc1

    SHA256

    a34cdbe03e066f4ffb7431c806c0600e5e7d4dba239174c373b2445dba3f66ae

    SHA512

    34af6a638e538703af3ef9b52b2a68a48daec1be14f77b6e464882f8f6d2ad670903cfe8d310c750d39624facf14184d6222196aec92231253ba868585b9f885

  • C:\Users\Admin\AppData\Local\Temp\nsi3479.tmp\Zip.dll

    Filesize

    76KB

    MD5

    542567398f77e95808afac5f96083c11

    SHA1

    d85c2129928188bee8fd48c5549aa3db4aebc462

    SHA256

    e5234c4c4b82edcf6936eea28b0f9a447423c9358c4c5a4f230897296f3f2d42

    SHA512

    3ae6c87d543d8822bcc26e327365218b6cb16d711ba1def06f8b796760badcab248bccc74309d8eb27e363d65af92307f76f38f013966188f1f1463152ea8b19

  • \Program Files (x86)\ClocX\SumatraPDF.exe

    Filesize

    6.2MB

    MD5

    a66c9054c372978b5752566361c27535

    SHA1

    527b8a0f9bffc41df878fb45e73f58e01e827e25

    SHA256

    54e19ff0a436f9806ff4dec14882a3391026751242b0e53330325e7c256d5155

    SHA512

    3114d24ccc0705cb722fd0a6ef135215e6475702d12073ab0567039a34d2cb279f7a6f6ffb58cc2a38dc87b3f97c71c245709ba6242813a0abd5ca0d0bb7e17e

  • memory/2712-13-0x0000000010000000-0x000000001001B000-memory.dmp

    Filesize

    108KB

  • memory/2712-17-0x0000000002B30000-0x0000000002B31000-memory.dmp

    Filesize

    4KB

  • memory/2712-18-0x0000000003C40000-0x0000000004868000-memory.dmp

    Filesize

    12.2MB

  • memory/2712-22-0x0000000002B80000-0x0000000002BBA000-memory.dmp

    Filesize

    232KB