Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2024, 02:00

General

  • Target

    9a7a61688d40c66b482f98ec3929296d.exe

  • Size

    59KB

  • MD5

    9a7a61688d40c66b482f98ec3929296d

  • SHA1

    28aaa93336dc0939c9160b554d3099ad979ef158

  • SHA256

    8e64fdda74d50d16ff9eccfff3c7711937342f2ae581cae840fd3481c85f52a6

  • SHA512

    c6e2ef0a9067e3db40827e3a42e62cde7e4e0d604483552842eaf1c41d31b4916b0a294b7542b9c41b2eb495278664c151e1c38397b8cea9ed23c83f6746b60b

  • SSDEEP

    1536:D+1MKLlB0OKo+QvYe5ypNb+oVgCaKfZF2qOR:XKRB0w5Ye5ypd+UgCaKBOR

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 30 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a7a61688d40c66b482f98ec3929296d.exe
    "C:\Users\Admin\AppData\Local\Temp\9a7a61688d40c66b482f98ec3929296d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\AppData\Local\Temp\9a7a61688d40c66b482f98ec3929296d.exe
      C:\Users\Admin\AppData\Local\Temp\9a7a61688d40c66b482f98ec3929296d.exe
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer start page
      • Modifies registry class
      PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2172-0-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2172-11-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2936-1-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2936-10-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB