Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 12:24

General

  • Target

    mpvod.exe

  • Size

    715KB

  • MD5

    e4ae853f940f772d11cdb231b8cf2b6b

  • SHA1

    d7d1c028c2639329ea0762ea8df89ccbfb94b400

  • SHA256

    938985ca32df0ec5ff1bbe23389a98bf98733e72fd7d70e5ba9ce3802669a759

  • SHA512

    9dd3330c9ea4033de52771755edb69e6b7ee7d59a2b9ce8f2b2eaa294c41e42f9603e0f58a9893b2f95be5204d121bab9767c70cd5f5b07c342bf058849e5e18

  • SSDEEP

    12288:xhveuM43b+/FyNLgnVr8qSFCF2iVVxPBIdqweL7uzrslvd3:vv3bZ14Vr8qUI+dre4rsl5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mpvod.exe
    "C:\Users\Admin\AppData\Local\Temp\mpvod.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Users\Admin\AppData\Local\Temp\VODServer.exe
      "C:\Users\Admin\AppData\Local\Temp\VODServer.exe" 35494
      2⤵
      • Executes dropped EXE
      PID:2228

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\data\setup.ini

          Filesize

          193B

          MD5

          23fd75b208777a28e7c4f5e755dc0441

          SHA1

          a28535bbbe42e989a7f06c07033eb816dd0b3198

          SHA256

          43fa10aa096caf5b61cfc7f7d53406ec844dadc27edbc71af5098dedb212d2b7

          SHA512

          d4f106a2ce6da3fd045c01a8f4e22be4b6e718bebe82eaabafa929e7641e872e1d8c3a12923be4097208b014c7d942045a04092d1ed9b79a9b2f47a418098fc1

        • C:\Windows\MidiPlay.drv

          Filesize

          6KB

          MD5

          89195f96e82b4228e237bd46bc41afa7

          SHA1

          89f6eec9d7f3c85ee242d2f7b22b02f2c3eb2c87

          SHA256

          e553e5b776a2266274d0eb57319423b80d9210c997135b424998f4e229361038

          SHA512

          352f2c02f690d5e7961beec1f4cece902b65e033962c2a6b0a0542617e51e2c427568388cceb2332a1cd38f545448a3c0e9cdde87fecdbb6d8360a539c8bc750

        • \Users\Admin\AppData\Local\Temp\VODServer.exe

          Filesize

          107KB

          MD5

          9e8ba54312d4c2ff2d880bd640a7d32b

          SHA1

          a34e1bf8a6cc649a80838b82c1d043eb59e44572

          SHA256

          9ed7f6e1ddb86482d8fefd25c0b9153e43d46f9440bf9539a907e5e9743b544d

          SHA512

          849065db2178d06f8a4caa8044da55ff3e5ca17c88a9eb4125cbdd08ad1af79b2a3d7c934c8ee84fcdcd7f48a24202c389ad0c4be795c51ef067ce3247922234

        • memory/2228-52-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/2980-0-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB

        • memory/2980-51-0x0000000000400000-0x000000000063D000-memory.dmp

          Filesize

          2.2MB

        • memory/2980-55-0x0000000000220000-0x0000000000221000-memory.dmp

          Filesize

          4KB