Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2024 04:31

General

  • Target

    964131af4ad550c0e046601f63e29251.exe

  • Size

    653KB

  • MD5

    964131af4ad550c0e046601f63e29251

  • SHA1

    55beb4cb739fa96ff0b556a510e6351372cd7422

  • SHA256

    e01303cb6615c17974dbd1fd571c8324bbd07cdedbc2456387d3b1ba3d415647

  • SHA512

    6a7c6af711257ddb4c18b1bbc4f2c7fddaa6fac669ac77de8724e3d6c8ce0f7a0a16324e7bb0e786849a3e8f54ae8c7c578b9a355b37f156126631038fea8d8c

  • SSDEEP

    12288:7bqGhoQMUfg/JUTphqrMpPholV6QOIAqPqihTujDmL5o:HzIUI/JUTphPp5cRAwqieil

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 43 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\964131af4ad550c0e046601f63e29251.exe
    "C:\Users\Admin\AppData\Local\Temp\964131af4ad550c0e046601f63e29251.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" "/s" "C:\ProgramData\KrazSE\KrazSE.dll"
      2⤵
        PID:2820

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \ProgramData\KrazSE\se.exe

      Filesize

      653KB

      MD5

      964131af4ad550c0e046601f63e29251

      SHA1

      55beb4cb739fa96ff0b556a510e6351372cd7422

      SHA256

      e01303cb6615c17974dbd1fd571c8324bbd07cdedbc2456387d3b1ba3d415647

      SHA512

      6a7c6af711257ddb4c18b1bbc4f2c7fddaa6fac669ac77de8724e3d6c8ce0f7a0a16324e7bb0e786849a3e8f54ae8c7c578b9a355b37f156126631038fea8d8c

    • memory/1716-0-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB

    • memory/1716-10-0x0000000000400000-0x00000000004AC000-memory.dmp

      Filesize

      688KB

    • memory/1716-12-0x0000000000230000-0x0000000000231000-memory.dmp

      Filesize

      4KB