Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2024 11:11

General

  • Target

    7fb141fb233a9100064b77d7f23b190e.exe

  • Size

    282KB

  • MD5

    7fb141fb233a9100064b77d7f23b190e

  • SHA1

    997603c51b7278975951ba0886c60252251d9366

  • SHA256

    2e73d0cf56f6b36bee161bb3a17edeb3ad389fb6b8eaa9cf1ce074e5b0e970c3

  • SHA512

    925ae4cc49c67329d1cfd32c12a34d19ffa34e796def81fb50b2dea6ace8ee3472c886eed04d47fcad138452af06f832ded7c63526ddcd050128d46b204de55a

  • SSDEEP

    6144:EfyvEJCGqAlLeDcmE798Mj4HWdCB9AF4za2kaADxv9poljBn:+8AhVmEx8RHWdCJYaADxvfABn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fb141fb233a9100064b77d7f23b190e.exe
    "C:\Users\Admin\AppData\Local\Temp\7fb141fb233a9100064b77d7f23b190e.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\DELME.BAT
      2⤵
        PID:2584
    • C:\Program Files (x86)\Happy
      "C:\Program Files (x86)\Happy"
      1⤵
      • Executes dropped EXE
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3248
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        2⤵
          PID:3048

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Happy

        Filesize

        282KB

        MD5

        7fb141fb233a9100064b77d7f23b190e

        SHA1

        997603c51b7278975951ba0886c60252251d9366

        SHA256

        2e73d0cf56f6b36bee161bb3a17edeb3ad389fb6b8eaa9cf1ce074e5b0e970c3

        SHA512

        925ae4cc49c67329d1cfd32c12a34d19ffa34e796def81fb50b2dea6ace8ee3472c886eed04d47fcad138452af06f832ded7c63526ddcd050128d46b204de55a

      • C:\Windows\DELME.BAT

        Filesize

        190B

        MD5

        9e833095a50dc72ac7757a62c1e6593d

        SHA1

        35e8fe604f90574f3c148100a9fde9bd0a397a4e

        SHA256

        4f9bc5f669d4956d21242f943fdde54c7098de855c4cb2f85cc2786a43e29748

        SHA512

        d28e38fd47b7b6f0273e975c0b3e6365a0efb0769063d031e40a7973d2e88b73a9eb4752025424439c110e6c33b404b82f24526f200f1c005fa7d2caeb05008b

      • memory/1596-0-0x0000000000400000-0x000000000050D92C-memory.dmp

        Filesize

        1.1MB

      • memory/1596-1-0x0000000000400000-0x000000000050D92C-memory.dmp

        Filesize

        1.1MB

      • memory/1596-2-0x00000000022C0000-0x00000000022C1000-memory.dmp

        Filesize

        4KB

      • memory/1596-10-0x0000000000400000-0x000000000050D92C-memory.dmp

        Filesize

        1.1MB

      • memory/3248-8-0x00000000007C0000-0x00000000007C1000-memory.dmp

        Filesize

        4KB

      • memory/3248-12-0x0000000000400000-0x000000000050D92C-memory.dmp

        Filesize

        1.1MB

      • memory/3248-14-0x00000000007C0000-0x00000000007C1000-memory.dmp

        Filesize

        4KB