Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23/02/2024, 04:36

General

  • Target

    99f82787fceb9fc942c370b2e16ccba58065bd9ac299f102c365298f174c77c4.exe

  • Size

    4.0MB

  • MD5

    647e1084f3b796fd93971efff7b6b5ee

  • SHA1

    4068cdc5209ee79666ef1954f94daa6f81883ac8

  • SHA256

    99f82787fceb9fc942c370b2e16ccba58065bd9ac299f102c365298f174c77c4

  • SHA512

    a7a74d2861220e99b48215834d831ec5858bdd77ea53a185e1fb6168da4dacba9d050e04654b3a1cc1aaf8f68a988a63674e1946c3ee2fc276fe2355288f0f56

  • SSDEEP

    98304:hggBh7kxnhKfwO30EfE0ShouYtSctZAbIZpOiqm0XyZum2S:hgkYmwEfhShdFc7Oiqm0Rm2S

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99f82787fceb9fc942c370b2e16ccba58065bd9ac299f102c365298f174c77c4.exe
    "C:\Users\Admin\AppData\Local\Temp\99f82787fceb9fc942c370b2e16ccba58065bd9ac299f102c365298f174c77c4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nso877A.tmp\System.dll

    Filesize

    12KB

    MD5

    cff85c549d536f651d4fb8387f1976f2

    SHA1

    d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

    SHA256

    8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

    SHA512

    531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

  • \Users\Admin\AppData\Local\Temp\nso877A.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    6c3f8c94d0727894d706940a8a980543

    SHA1

    0d1bcad901be377f38d579aafc0c41c0ef8dcefd

    SHA256

    56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2

    SHA512

    2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355