Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2024 18:10

General

  • Target

    99cc674e13a8576ad88dd17ec98e9426.exe

  • Size

    611KB

  • MD5

    99cc674e13a8576ad88dd17ec98e9426

  • SHA1

    647107d0f1a4319f10376e83ec286a0f0bd5a949

  • SHA256

    5c29571473e307c8b3707f6aa2590779fcb9bcd4aff681ff49f05fc172d99a59

  • SHA512

    0b3c2a98faade7594423b1e808ab35dd6f603c4eba4373a3ad05e8566ac941e828dd01b5afded3328f1819d4a09861628460b1ec7d1d6c0b2b4e045c8fdd8d3c

  • SSDEEP

    12288:ZmNVdMxVxw6YzecXL0ZOd9eH0En7IOm2Xh0tmsuqf2M4GJh5UTk:ABswVCbZI9adXgoqf6eYTk

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99cc674e13a8576ad88dd17ec98e9426.exe
    "C:\Users\Admin\AppData\Local\Temp\99cc674e13a8576ad88dd17ec98e9426.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Program Files (x86)\AdvTopC\AdvTCApp.exe
      "C:\Program Files (x86)\AdvTopC\AdvTCApp.exe" /r
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:1820
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\AdvTopC\TCHelper.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\AdvTopC\AdvTCApp.tlb

    Filesize

    3KB

    MD5

    665656ceda2660da436eb6c2c518473d

    SHA1

    6e2b6b6b2032a2b1ce1963af8480ab41143f6371

    SHA256

    ddeef9fc2836cc5916456129c1500c497b5d87e0d315f0297cbbea3661f27871

    SHA512

    3e0c86c304babd0447284721f6746aa6c01a08f13d7f8c49b16594a7260bba7ec7073a79918107eacf9b686dd32c006b4744fff8b8e6d553507444ff8254e7d3

  • C:\Program Files (x86)\AdvTopC\TCHelper.dll

    Filesize

    244KB

    MD5

    a4e15995cacb7bd5ec5c630653b3492a

    SHA1

    1f45575a04095061ad35c4dfc5d2716ae273be42

    SHA256

    be1a008d6ab6894ff9896ffa85404f9cf419c1b8952977687aa9bb6f24672139

    SHA512

    1d611fbe5f0f118b20cf159dbee18261e343d4b6addded484eb30b0b2782de29a1ae6cda80006e388eb3b993f416a958a822102416b9bd086a1d088104a0d072

  • \Program Files (x86)\AdvTopC\AdvTCApp.exe

    Filesize

    394KB

    MD5

    deec7b9c0e4e632b7c0b0cf74b7d2941

    SHA1

    fdf8d9b9ee6c0ba37f03197c18ad4305f7be88b8

    SHA256

    376552c201e989925c46526db823c00f16d5709b8d9474a35736aa528ce3b3bb

    SHA512

    93a18e70462ad468319e88ea3dc095a721699bb26e719f41d485ced53ed28216a35a134796a877df507ee316ebb5d5c85c5f8366fedc634807e1ce721a726319