Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 08:53

General

  • Target

    96c370b328850504bf8da07037dcefb2.exe

  • Size

    14KB

  • MD5

    96c370b328850504bf8da07037dcefb2

  • SHA1

    805bf24eabdb37a17a4730c0a38c8ef67aa17b81

  • SHA256

    9c61edd438ab73bff90522dc1a535f0bb43bf1f9e91594688a679b0983b74201

  • SHA512

    07624accb03ab360b98425e756ef2c540e2016ef7c7cf69e4637e0a45eece89662794425f525d33b3217911c492f07596b40edac747d00c82ae0fdb34bdb4e59

  • SSDEEP

    384:NGNUNL6YjpQ/Et74EmYjfwDRYQ3g+Ovb10lDbeAvdOEVItnj8Q:8UNu/k4VYjfW70GlDbe49atnIQ

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96c370b328850504bf8da07037dcefb2.exe
    "C:\Users\Admin\AppData\Local\Temp\96c370b328850504bf8da07037dcefb2.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\BD37.tmp.bat
      2⤵
      • Deletes itself
      PID:2968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BD37.tmp.bat

    Filesize

    179B

    MD5

    50cef47ad247bfbaefc0f892d053dfd0

    SHA1

    356b99922c4f73a5b46a8d1521da094d7b4b76e1

    SHA256

    cc9faedfc535a3371d035f18a05814dc5eaa503311b39b4d445ab4a824312664

    SHA512

    2b9185632ba1e4f997f0cf198c80bb940a15899c43421b8e18fe2f9e169de366b732a4ecc922280d4e53476017536e5cfb019eabe3c6b6867b86484ecfaa8f13

  • C:\Windows\SysWOW64\inetresdxc.tmp

    Filesize

    939KB

    MD5

    cb1eeb3e71cdf9019c898ab192278cf7

    SHA1

    4ba07896e186c38d2a0922c07781acdc7186ef36

    SHA256

    7bef6934d1e21b1ddaa4b5e634a96a3b39b8d0ef4863403a25538f8f99c2ca07

    SHA512

    d96bbf2bdf40ab859cac6824c6082da6c6ebbff5b9a0f92e6cf1bdd2abf283e8c40d4aa698aa037c89762ce6c233a51fcd1639c23103a2845afd684dcfea4f0e

  • memory/2248-12-0x0000000020000000-0x0000000020008000-memory.dmp

    Filesize

    32KB

  • memory/2248-21-0x0000000020000000-0x0000000020008000-memory.dmp

    Filesize

    32KB