Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2024, 08:45

General

  • Target

    8671b038ea4c525382f4518d6b57c7c3.exe

  • Size

    164KB

  • MD5

    8671b038ea4c525382f4518d6b57c7c3

  • SHA1

    6dda926f938f3fc8e44468c05469547b9a5e5588

  • SHA256

    34de36da87a46160cfcdddf07817cfb02bb63578ac78b1b7f2b3987aafff5ef3

  • SHA512

    04ebe0053c5886a2d13f6d2a4f01fd09f38c8e74149b15db38e46be8e579dac8c526fd085abed37f7a8ae9c2f30caff09eef94857a3cd3649832193be9e18466

  • SSDEEP

    1536:qMSwdqgJ7zGYLwKABCIvhZ9C9eO4F+NPouHj6Koa6Epm0SS+F8OJ6t+:hSwdqmGYL/t6jaUS+

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8671b038ea4c525382f4518d6b57c7c3.exe
    "C:\Users\Admin\AppData\Local\Temp\8671b038ea4c525382f4518d6b57c7c3.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\qoaojod.exe
      "C:\Users\Admin\qoaojod.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2180

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\qoaojod.exe

          Filesize

          164KB

          MD5

          71e80be2feaaa208eb5089fe011b6d1c

          SHA1

          abca5c57cffbe83ac99e74ed8329246a6cf11b4e

          SHA256

          922a9010d4d86db1603160ac7a0988a6bdf9a5d1d9ff69ef272c91a927508513

          SHA512

          74d8ade97945fbd7dfa444485247f1b9f54c6d5a9de9e35dbd3c4df6f4e079a91a1d5f582883777a9a96ac7a4f648dfd7e39f741e54ed6a9c8eeaea3c051394e