Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 02:00

General

  • Target

    9831dd957dc4cf5cd79d25078d7dba4a.exe

  • Size

    74KB

  • MD5

    9831dd957dc4cf5cd79d25078d7dba4a

  • SHA1

    e0226c71d7fcee98ab18bd747755dde0d5f16835

  • SHA256

    2ad60b01567f835fb00f4011fe07d456533946caf290eadeacf33c9d7c950508

  • SHA512

    842f2ee386c71ee9d9838b59c6b1fe02ca5232b58c4e0605928965f88df4b761044dd159da2fc0411b526eb9c9df25d3b57f0b9034163371a2b62d53ee6f823b

  • SSDEEP

    1536:UHkR+6drKzpljMXNEQOCMAA5FR9cpbeMqd95e+d+z7TNXijHY5pO6H:FR+EEM9Nw9c1e9e+0NXijcO6H

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9831dd957dc4cf5cd79d25078d7dba4a.exe
    "C:\Users\Admin\AppData\Local\Temp\9831dd957dc4cf5cd79d25078d7dba4a.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s C:\mswinsck.ocx
      2⤵
      • Modifies registry class
      PID:2712

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\mswinsck.ocx

          Filesize

          105KB

          MD5

          9484c04258830aa3c2f2a70eb041414c

          SHA1

          b242a4fb0e9dcf14cb51dc36027baff9a79cb823

          SHA256

          bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

          SHA512

          9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0

        • memory/2608-0-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2608-5-0x00000000035E0000-0x0000000004642000-memory.dmp

          Filesize

          16.4MB

        • memory/2608-10-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB