Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 03:45 UTC

General

  • Target

    9864533ae2246c970cb50cb667ce41e3.exe

  • Size

    3.3MB

  • MD5

    9864533ae2246c970cb50cb667ce41e3

  • SHA1

    b23b693b6cc12ad3ff93397daf3b3d837066d7c2

  • SHA256

    692a45e032fb25a2f44ac26065e834e63bf1540deed3066407202d882a8449cc

  • SHA512

    3c23ae93e69439b1cdcc75fd63505a703c518c3f28e0a2f5979bad3577057311e6298583a0fe38ebff2e17c587d2f1c8014f3ce6aab3d97565ec13dda8fc7e3f

  • SSDEEP

    49152:B9Eqr58vFf+4jWMC50tCP36RktzuuTT+pwsdPd5XDv1TDIkXSWa6KPkwgmPm4GtR:4quvK1GtCPRhTT+xdPdlr1/nU9kwRLEj

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9864533ae2246c970cb50cb667ce41e3.exe
    "C:\Users\Admin\AppData\Local\Temp\9864533ae2246c970cb50cb667ce41e3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:2296

Network

  • flag-us
    DNS
    149.220.183.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    149.220.183.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    180.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    180.178.17.96.in-addr.arpa
    IN PTR
    Response
    180.178.17.96.in-addr.arpa
    IN PTR
    a96-17-178-180deploystaticakamaitechnologiescom
  • flag-us
    DNS
    178.223.142.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    178.223.142.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    75.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    75.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    157.123.68.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    157.123.68.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    21.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    21.236.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    153.141.79.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    153.141.79.40.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    149.220.183.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    149.220.183.52.in-addr.arpa

  • 8.8.8.8:53
    180.178.17.96.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    180.178.17.96.in-addr.arpa

  • 8.8.8.8:53
    178.223.142.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    178.223.142.52.in-addr.arpa

  • 8.8.8.8:53
    75.159.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    75.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    157.123.68.40.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    157.123.68.40.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    240.221.184.93.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    240.221.184.93.in-addr.arpa

  • 8.8.8.8:53
    21.236.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    21.236.111.52.in-addr.arpa

  • 8.8.8.8:53
    153.141.79.40.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    153.141.79.40.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nse69D8.tmp\tools.dll

    Filesize

    236KB

    MD5

    e12f05661436f2974cf91b5fc76fb5f4

    SHA1

    5e0b7887950204713bef3da0018911279f2540ec

    SHA256

    1873de723938193f9f0877b08c160884b79503b6607598158ad99bd909189fdc

    SHA512

    61d42e055865dd98552b29dd69dc3d761bc7f77c1af108ad13b0b390059be5668657645258c0c08052a5fe1e9f6bdb018da136eb103b7335097487ec0de5d22d

  • memory/2296-19-0x0000000003500000-0x0000000003510000-memory.dmp

    Filesize

    64KB

  • memory/2296-23-0x0000000073D90000-0x0000000074341000-memory.dmp

    Filesize

    5.7MB

  • memory/2296-24-0x0000000073D90000-0x0000000074341000-memory.dmp

    Filesize

    5.7MB

  • memory/2296-25-0x0000000003500000-0x0000000003510000-memory.dmp

    Filesize

    64KB

  • memory/2296-28-0x0000000003500000-0x0000000003510000-memory.dmp

    Filesize

    64KB

  • memory/2296-29-0x0000000003500000-0x0000000003510000-memory.dmp

    Filesize

    64KB

  • memory/2296-30-0x0000000073D90000-0x0000000074341000-memory.dmp

    Filesize

    5.7MB

  • memory/2296-31-0x0000000003500000-0x0000000003510000-memory.dmp

    Filesize

    64KB

  • memory/2296-32-0x0000000003500000-0x0000000003510000-memory.dmp

    Filesize

    64KB

  • memory/2296-33-0x0000000073D90000-0x0000000074341000-memory.dmp

    Filesize

    5.7MB

  • memory/2296-34-0x0000000003500000-0x0000000003510000-memory.dmp

    Filesize

    64KB

  • memory/2296-35-0x0000000003500000-0x0000000003510000-memory.dmp

    Filesize

    64KB

  • memory/2296-36-0x0000000003500000-0x0000000003510000-memory.dmp

    Filesize

    64KB

  • memory/2296-37-0x0000000003500000-0x0000000003510000-memory.dmp

    Filesize

    64KB

  • memory/2296-38-0x0000000003500000-0x0000000003510000-memory.dmp

    Filesize

    64KB

  • memory/2296-39-0x0000000003500000-0x0000000003510000-memory.dmp

    Filesize

    64KB

  • memory/2296-40-0x0000000003500000-0x0000000003510000-memory.dmp

    Filesize

    64KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.