Analysis

  • max time kernel
    14s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 04:40

Errors

Reason
Machine shutdown

General

  • Target

    8e3ca639fe264dfc08d39c51856eda0a.exe

  • Size

    244KB

  • MD5

    8e3ca639fe264dfc08d39c51856eda0a

  • SHA1

    6ef6bd78c55640b030f1cceaa3434516798a5b64

  • SHA256

    bd22b2bc3837cd9fb42d4e6ac88637ccc477a8b36ede5e35724ac2ccb3741e44

  • SHA512

    6b1a1e4a67011bb91d28124f935fae29a85b2facca3590d24987a0b885b11d53909637ce55904a75b8d5d289b8bfa18b7d942df7803d7e3eea71c3a1cec7338d

  • SSDEEP

    3072:1wJIPTeH3y+QxMgPTX2QN1+FrCLoiX6MNbOuQokGpmTUWs228l2ME0:1LPCy3OgLX2QN1+FcowzppmTHvub0

Malware Config

Signatures

  • Sets DLL path for service in the registry 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 5 IoCs
  • Modifies data under HKEY_USERS 49 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e3ca639fe264dfc08d39c51856eda0a.exe
    "C:\Users\Admin\AppData\Local\Temp\8e3ca639fe264dfc08d39c51856eda0a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Users\Admin\AppData\Local\Temp\ipw.exe
      "C:\Users\Admin\AppData\Local\Temp\ipw.exe"
      2⤵
      • Sets DLL path for service in the registry
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2912
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Sets DLL path for service in the registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:3024
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:3064
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1704

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\ipw.exe

        Filesize

        20KB

        MD5

        cc1d214fbd39b7be64dc289275715283

        SHA1

        2e2f17779a4eb6deeed4c0de68ec8f2d5d979558

        SHA256

        bf85eea020f6b89680a68be9f0bc648b3b1e5bd938e8534a24f94aac667a0ceb

        SHA512

        2a1f0daf1e13fdcd84aedbd92209c4bbc66d17ede1aae37eeff07ce1101d30e62977396cda4b4c5287e5a067a57e102a169da9e841971c7243695010d8ffefc2

      • C:\Windows\SysWOW64\fsutk.dll

        Filesize

        116KB

        MD5

        e32097b37d709a6d7431635bd39806fc

        SHA1

        90776953c879bccc69a2cb2dc00a146ba56c1d16

        SHA256

        2994c374584915f0ed9a0cd4ccaa74422af6eb8eac7f52404b34b7d69db0081d

        SHA512

        23dcce6793f68d6768d866b3ab049c7248c3f63fa3798008f9e2510639da59ba233a8e259a4b4752f6b7cc6164bd469064463798640f55388b6390418c3653c3

      • \??\c:\$Recycle.bin\int.dat

        Filesize

        220KB

        MD5

        0aae88e0734fc76fd7d644f4cc5aaf8e

        SHA1

        fb83ec411ba34741221134ba9e19290e492f53c3

        SHA256

        35a2dfd0187c3d0801b0306dd884323956ae3d9c2d8928487956c6691b92c19c

        SHA512

        288e20433361d1ec5c8c18a37393364407d9d53974b4cae4c0ad8ece29990c79de7006d2ac9c7245e0c540dbde85d53881228b485e3f5a3a707342a375ca29c0

      • \??\c:\windows\SysWOW64\liprip.dll

        Filesize

        84KB

        MD5

        e8d8c956e4152d84e5144a19684f8d93

        SHA1

        7fcc5e56a02e0e2e74ffce3e9489e0f97beea239

        SHA256

        b6acfdf5f3e4938d617320f78a853de2a40f222846cf7f5361e067ff44aa6377

        SHA512

        b54800e939f178e2be808d888361db587d551ad0b8cc19f8d522c4a05683e3961e3d720872cc2d754787333857899d61611661b7e5aa75b05686698a9005c747

      • memory/1704-137-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

        Filesize

        4KB

      • memory/3024-19-0x00000000000E0000-0x0000000000100000-memory.dmp

        Filesize

        128KB

      • memory/3064-82-0x0000000002E10000-0x0000000002E11000-memory.dmp

        Filesize

        4KB