Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2024, 20:32

General

  • Target

    8a772437e5ab898826c2e4e87d280be6.exe

  • Size

    71KB

  • MD5

    8a772437e5ab898826c2e4e87d280be6

  • SHA1

    d79b7eeb8df3a1b73adb3caebb2231692d4cb452

  • SHA256

    bd8473f2fe4fb7cba21ba9128e77707d89e291134d3ed7c26bc49e086db6f729

  • SHA512

    c10b410b390085cebff7db4d45d402d8237177d46d853bfa94a6f9a5bec0afb53ecaf0c3bbd7b20ce2abee090f6481cc0751a06a6980e3497d82e529bb779d26

  • SSDEEP

    1536:4nXeBrdS604S1xSMUwbz1u55FJeWdmX2SUnYeNMLeLIPwO4tyiY:4XErdfV6xJUjtJtm1UnYpe0PoyR

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 7 IoCs
  • Modifies registry class 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe
    "C:\Users\Admin\AppData\Local\Temp\8a772437e5ab898826c2e4e87d280be6.exe"
    1⤵
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies registry class
    PID:1076

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\55cff068.dat

          Filesize

          123B

          MD5

          be4b1b8d45d0729c4b39ae40fc73a86b

          SHA1

          3186a8f52d1a190ec2e01e222889a4798109efb6

          SHA256

          00665e657472657d12d34163785cce23245e68893bca00d889d197bdf13d940f

          SHA512

          33cf17dfec0c0b65897def04015ac7c7ca5c5452d11477ebd960c064cc1782dbf3e15f4e17edcb1b18adeb46ed5a38f1a2caa9146740807f80c8e7630dfab050

        • C:\Users\Admin\AppData\Local\Temp\ea5d4f1f.dat

          Filesize

          1024B

          MD5

          0f343b0931126a20f133d67c2b018a3b

          SHA1

          60cacbf3d72e1e7834203da608037b1bf83b40e8

          SHA256

          5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef

          SHA512

          8efb4f73c5655351c444eb109230c556d39e2c7624e9c11abc9e3fb4b9b9254218cc5085b454a9698d085cfa92198491f07a723be4574adc70617b73eb0b6461

        • C:\Windows\SysWOW64\kbdbu.cpl

          Filesize

          204B

          MD5

          2f1a108a005828bde9ecf90432d8d0e9

          SHA1

          c774ae00ba0fcd63f1a1331851adaf42ff3f7f18

          SHA256

          a4f31605fd0459a4d6f62a42ef53ef39889072367b674ac3675f86f48028d9df

          SHA512

          dfe88b1c65737e7ab7c95d0e1b12644905ac493eb47975dff3ea13611ed31530124242b61665a486a2f82dac184f5526f238f732c92faecc2de3fe3d0790ee12

        • C:\Windows\SysWOW64\kbdbu.cpl

          Filesize

          599B

          MD5

          4c19e8fe701b33e1e64b79b231cfe92f

          SHA1

          e7a3c65adf2736e228758c476ba385536693767a

          SHA256

          0df6d70f8bf4f3c5bd59ab448461d5b7dcf108a093e0de6ab67aa527b28d50dc

          SHA512

          b228d3080b936c5a4e6b10cedcb3cf0eef662698f4d1dcd91643bdc02e1c91f4d546dc8951c6c7c53fb7fc879223b907fbec98a0e61a49878f811396adb7b15e

        • C:\Windows\SysWOW64\kbdbu.cpl

          Filesize

          366B

          MD5

          21514a15fa2ec5c6a20d0f2067434add

          SHA1

          627efb2aff867c0f63607645327ae0be3082f9ca

          SHA256

          b55e52e464038d64ed08493547aa9c93bda26c006c1045b7b1a91487f19c186d

          SHA512

          92c6f62ca2507b2aabdfacd43ce218b558ee25c11b239820f9dd9e8cc81e20a38d6aea76d3869e9dadd957f9dd88ab7519b805b49a2469e3d68cdf5ec604367a

        • C:\Windows\SysWOW64\kbdbu.cpl

          Filesize

          178B

          MD5

          498ddcc29ebbf052bc744db2b3a629ba

          SHA1

          5b37b80aa739ac113bde68c198669fc720c1ab84

          SHA256

          25d0b45e7f0841ddfbc7f0b4ee28e65f53cdcfe515ffd3a4d0a82ae2af6b74df

          SHA512

          10018e8d1a123f0f1b2705d34b91482e4cced969fc885598d248539ea3beda9aec993125f6f7c0e7c794ee31564e69511bcf9cb53e4c3b7213fb6adea07c61aa

        • memory/1076-805-0x0000000000400000-0x000000000042C000-memory.dmp

          Filesize

          176KB