Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2024 15:10

General

  • Target

    8f78832d0481f5a37990941ca2c78ed1.exe

  • Size

    21KB

  • MD5

    8f78832d0481f5a37990941ca2c78ed1

  • SHA1

    d2d951940a5633ae594c05fbe4ccb9a544bd457d

  • SHA256

    16abb80e73599e6bbcb353667a743ff48b87a68ee2fb7489562325d6acd1d95a

  • SHA512

    a7fdb2979b24675131a7a1385f695cd70db58d0720544e97decc3db744b6cbf31ad3e9102e73ef5367cbc81a981cc521c14d5f8691e8f4d1410a14672f08422b

  • SSDEEP

    384:Z8sCHeP5IEA2ZUBTFSrR1ufAtUXNfQE7:ZlCH7EVZUBTFK1uZXNT

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 4 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 4 IoCs
  • Disables Task Manager via registry modification
  • Drops startup file 2 IoCs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 23 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 22 IoCs
  • Drops file in Windows directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f78832d0481f5a37990941ca2c78ed1.exe
    "C:\Users\Admin\AppData\Local\Temp\8f78832d0481f5a37990941ca2c78ed1.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Disables RegEdit via registry modification
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\SysWOW64\Startup\scvhost.exe
      "C:\Windows\system32\Startup\scvhost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Windows\SysWOW64\Startup\scvhost.exe
        "C:\Windows\system32\Startup\scvhost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2732
      • C:\Windows\SysWOW64\Startup\Scan.com
        "C:\Windows\System32\Startup\Scan.com"
        3⤵
        • Modifies WinLogon for persistence
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1900
        • C:\Windows\SysWOW64\Startup\scvhost.exe
          "C:\Windows\system32\Startup\scvhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1952
        • C:\Windows\SysWOW64\Startup\Scan.com
          "C:\Windows\System32\Startup\Scan.com"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1700
        • C:\Windows\SysWOW64\Startup\scvhost.exe
          "C:\Windows\system32\Startup\scvhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2116
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan.com
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Scan.com"
      2⤵
      • Modifies WinLogon for persistence
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1852
      • C:\Windows\SysWOW64\Startup\scvhost.exe
        "C:\Windows\system32\Startup\scvhost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2168
      • C:\Windows\SysWOW64\Startup\Scan.com
        "C:\Windows\System32\Startup\Scan.com"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2792
      • C:\Windows\SysWOW64\Startup\scvhost.exe
        "C:\Windows\system32\Startup\scvhost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1292
    • C:\Windows\SysWOW64\Startup\scvhost.exe
      "C:\Windows\system32\Startup\scvhost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Melati.bat

    Filesize

    25B

    MD5

    b28b76dd27531fb71240e74117201437

    SHA1

    128f5be3f1d22da817cf5bded45c59360447de38

    SHA256

    f8931c13a85927c02d741e619b9f3d9a97366a7ba5b5abc2903e6986a647c53d

    SHA512

    7377f74e81c42f3bf4d4ba8bb593801d0e049a63b800e7cce5ad055107fcd4aa754cb73a387b0eb61f4a9b6787532ba0672c5aa280b73231fe1d8b86f30b5e98

  • C:\Windows\system\winexec.com

    Filesize

    21KB

    MD5

    8f78832d0481f5a37990941ca2c78ed1

    SHA1

    d2d951940a5633ae594c05fbe4ccb9a544bd457d

    SHA256

    16abb80e73599e6bbcb353667a743ff48b87a68ee2fb7489562325d6acd1d95a

    SHA512

    a7fdb2979b24675131a7a1385f695cd70db58d0720544e97decc3db744b6cbf31ad3e9102e73ef5367cbc81a981cc521c14d5f8691e8f4d1410a14672f08422b

  • memory/1292-154-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1292-151-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1700-129-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1852-146-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1852-98-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1900-152-0x0000000002340000-0x0000000002350000-memory.dmp

    Filesize

    64KB

  • memory/1900-147-0x0000000002340000-0x0000000002350000-memory.dmp

    Filesize

    64KB

  • memory/1900-155-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1900-97-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1952-125-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2056-139-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2168-127-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2184-136-0x0000000000750000-0x0000000000760000-memory.dmp

    Filesize

    64KB

  • memory/2184-39-0x0000000003CC0000-0x0000000003CD0000-memory.dmp

    Filesize

    64KB

  • memory/2184-34-0x0000000003CC0000-0x0000000003CD0000-memory.dmp

    Filesize

    64KB

  • memory/2184-0-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2184-133-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2184-135-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2184-29-0x0000000003CC0000-0x0000000003CC6000-memory.dmp

    Filesize

    24KB

  • memory/2184-134-0x0000000003CC0000-0x0000000003CC6000-memory.dmp

    Filesize

    24KB

  • memory/2184-162-0x0000000000750000-0x0000000000760000-memory.dmp

    Filesize

    64KB

  • memory/2732-76-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2732-75-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2792-128-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2900-91-0x0000000004400000-0x0000000004410000-memory.dmp

    Filesize

    64KB

  • memory/2900-38-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2900-95-0x0000000004400000-0x0000000004410000-memory.dmp

    Filesize

    64KB

  • memory/2900-73-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/2900-157-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2900-158-0x0000000002570000-0x0000000002576000-memory.dmp

    Filesize

    24KB

  • memory/2900-159-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/2900-160-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2900-71-0x0000000002570000-0x0000000002576000-memory.dmp

    Filesize

    24KB

  • memory/2900-167-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2900-168-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2900-169-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB