Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    25-02-2024 05:18

General

  • Target

    a2fcaf8a8eb2c4eb8e105a1c96ef7396.exe

  • Size

    466KB

  • MD5

    a2fcaf8a8eb2c4eb8e105a1c96ef7396

  • SHA1

    5b9c7b5d2fe92e32c25c670829652d9e9450a0a8

  • SHA256

    db77492fa4252b11118eb3cf1d38683bf36cba4d6775aa68f88455a875e97d8c

  • SHA512

    16210652f02666bafed97a22eb4f15f3db32f0d8c6ac9731137ebc1b6ddb4452dbc8cab129808074892cc0b374d00936b8dc080a8c713ee66187bb7705c503f8

  • SSDEEP

    6144:4uaFmrZC9YOtyRkPyn9uA5TQfJAGUImt9SV72iEeTBR0:49WZC9txPyQAKUImTj5eTv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2fcaf8a8eb2c4eb8e105a1c96ef7396.exe
    "C:\Users\Admin\AppData\Local\Temp\a2fcaf8a8eb2c4eb8e105a1c96ef7396.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Users\Admin\AppData\Local\Temp\TklvMD\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\TklvMD\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TklvMD\svchost.exe

    Filesize

    473KB

    MD5

    dc6b99b6df0acfeadad640304bd09346

    SHA1

    a5b1c52be48c1312735c9fe358b6673e3c5c6e3a

    SHA256

    9b9de21f4bdffbe7a090520b50e6fb8cf8fc8dea03a83f55e9451ebe7f7df89d

    SHA512

    db3d2e491e753e38b69fbed279c8b3262b35ca53cf3d5ace80acda92e2937667185005b3b73ab70ec62b0650b827dd3d73cf841a875f1c26d79e011ac23dc7ed

  • C:\Windows\CLOG.txt

    Filesize

    4KB

    MD5

    6590356f08767175b326fa0044503613

    SHA1

    f65e9052e31c3dcd448ada93ca0e2b84cfa13bac

    SHA256

    b9165832a1af6284199a255912c8b4164229a0cff00f0b5492c1fa1318480824

    SHA512

    0e3db3982fa543d7168714cf630b3cee7479ab1e39552e4a9247180054cb472ae0666f3fba78563c778890821368a06c7c66b76b0a5feeedcb513344757a100c

  • C:\Windows\CLOG.txt

    Filesize

    165B

    MD5

    c793d783a0c30dcfe67ec95eeb92a09f

    SHA1

    bc6062149d1198fd1f6b1b8b1339fa0d8866d326

    SHA256

    bd987e2d929f46a2373f761352642678282d6e39ca48130144ff87be31966bc6

    SHA512

    57b9af1676f5c685573f44016529831e5decb01047409cfcb2d7f4b7673edbd26eca5d733ba7aad415f5373ccbce5d266a058aef3f502d7333fdde2eefecebe9

  • memory/2480-14-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2480-15-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2908-0-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2908-9-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB