Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2024, 02:41

General

  • Target

    87bdb0a2b3efeb7dbbf36b7ff3eb5761.exe

  • Size

    144KB

  • MD5

    87bdb0a2b3efeb7dbbf36b7ff3eb5761

  • SHA1

    0ad7893f39aef48d8ff1eb9f14e6305f07f4a42f

  • SHA256

    a835329d85cf0a2529ee48e6caa71ae8b2d7b374ef34eb92d4d2b8dc08c1b486

  • SHA512

    ed0f5a3da64a122611a14051eb620bcfc5ce77d9d884fc54f7d6b6617bfb54613d9b2355911f2f024e5b3c4caaa254adba58f5512821a7eec7a825e914e01103

  • SSDEEP

    3072:KhAMV3kvJoUv3+fMH9nwyIaozwi973Pe2a:KhzOIaywi973PH

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Drops file in System32 directory 23 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87bdb0a2b3efeb7dbbf36b7ff3eb5761.exe
    "C:\Users\Admin\AppData\Local\Temp\87bdb0a2b3efeb7dbbf36b7ff3eb5761.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Windows\System32\sk0r_mailer.vbs"
      2⤵
        PID:1528

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\3787\Familien_Bilder_usw\my_own_picture_for_you.bmp.exe

            Filesize

            144KB

            MD5

            87bdb0a2b3efeb7dbbf36b7ff3eb5761

            SHA1

            0ad7893f39aef48d8ff1eb9f14e6305f07f4a42f

            SHA256

            a835329d85cf0a2529ee48e6caa71ae8b2d7b374ef34eb92d4d2b8dc08c1b486

            SHA512

            ed0f5a3da64a122611a14051eb620bcfc5ce77d9d884fc54f7d6b6617bfb54613d9b2355911f2f024e5b3c4caaa254adba58f5512821a7eec7a825e914e01103

          • C:\Windows\SysWOW64\sk0r_mailer.vbs

            Filesize

            1KB

            MD5

            b69d0e02d70d0103c98649fb82d5ab66

            SHA1

            eee8747beaa8d3c93bf90d576c72c2428a723e02

            SHA256

            cdce16cd89238517643c4fb1ea9da490ef4fa60f758d18545b92d868e0085c61

            SHA512

            03e664544790cf9db4d74f570d288533a84e58d8be4596141a3a5c436bc85500817ef6a3d3e6822c44f5b1f6d982c325068e9fda0941262bc989bed04bf2e235