Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2024, 11:35

General

  • Target

    89678289736124fc58686e09c5cfc13a.exe

  • Size

    13KB

  • MD5

    89678289736124fc58686e09c5cfc13a

  • SHA1

    a38cfdd6a53b6ed4dfa02dde05015f40bd25e234

  • SHA256

    8b77fc24e7bffbd595c5aeba1b628f2a3820b0ceb77aca880d19cc324a3b8ce0

  • SHA512

    8ebaa5236e87a2e176bafd4f1f4d140faf38170f273676a21c0cafc408f78c2e4dd4c6127cb49b3ccdea9f895b35f180e9c5b8e76915ccf9facb96227bb6be34

  • SSDEEP

    384:4cJoXJz6ttH0lbX4qHmOpOmjuwli/roDiCF2yPP:4pXJuY4hG5g/8VAy3

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89678289736124fc58686e09c5cfc13a.exe
    "C:\Users\Admin\AppData\Local\Temp\89678289736124fc58686e09c5cfc13a.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\D8AD.tmp.bat
      2⤵
        PID:2848

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\D8AD.tmp.bat

            Filesize

            179B

            MD5

            916fa2c2243d08105f4ca97f30a0da61

            SHA1

            fcd0a477b8e297902c6cde5c479bf935e970520d

            SHA256

            ffb5a3e6d3d5ba67513e07b6e518bc5a3c2664920d0001f4a7e0c0c4c26b26c4

            SHA512

            4daff4dfd003f006b595379d9613dc52830ba61a4b220c3e4eeb20260f2bff555f99c612534eb4980e9c4839aae99f50e4d6530ed2a202d0f4138f35b4ac0f62

          • C:\Windows\SysWOW64\sewmwrii.tmp

            Filesize

            722KB

            MD5

            a158466f0a11d5b0d4ff99eb39e9f453

            SHA1

            7ddf973fc8a4e8e81040d6f801564e9c8838bc51

            SHA256

            9ef2c46b18945bb1ad065793f409ac93017c5f8a68a46b5d593dea5a59281e06

            SHA512

            9e0b74e2b649f11c05e517c8d881b6ffeb63309c7e7b1819c6c39931444cb10b770bfd9407d2de6d03d6cd98e0ad18ca203c59b59852c405a3358ebe3cfdbd51

          • memory/4968-13-0x0000000020000000-0x0000000020008000-memory.dmp

            Filesize

            32KB

          • memory/4968-18-0x0000000020000000-0x0000000020008000-memory.dmp

            Filesize

            32KB