Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2024, 13:44

General

  • Target

    a3eec32541be894b7f25be656f28a9a4.exe

  • Size

    204KB

  • MD5

    a3eec32541be894b7f25be656f28a9a4

  • SHA1

    616998ca4ddf679594077e2bc7fa82b4fb95f590

  • SHA256

    7bf213788373110026030818ac55747e5e6556ee8b1860f712982673c2c51956

  • SHA512

    f844811a1af17854dcdd6ca126ae67ebadff99f6a6a91cdbdf7341efc4bbc42fd185b3b8184cc8c95b04b4cde3a32283ed812a9f994bc810e8f67ec1916ac07d

  • SSDEEP

    3072:d/VEn1eZTsNnE0zSyFRouI97LPWGDJzJGgyys0yQYpgy69GSAj:d/VEn1eZ2pfG7LPWGDJc0yJpD69W

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3eec32541be894b7f25be656f28a9a4.exe
    "C:\Users\Admin\AppData\Local\Temp\a3eec32541be894b7f25be656f28a9a4.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\pchealth\services.exe
      "C:\Windows\pchealth\services.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2220

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\AFIRE.DLL

          Filesize

          152KB

          MD5

          e408ee2c6efa93ccd3683e52ad58bd1c

          SHA1

          f8770130fcc9ca8116dbf9c5ecb982c77f3fa41f

          SHA256

          324d92fadd3d00ad6e481a9e97c1961ac8c871cb175e911f2e5e0fb9c7aaf3bf

          SHA512

          c324cf0935148df30cbe398399b6b90b757ea6ab595c9b5353c6c2201699038963b586c9baca4446a4b02d1a094ca5850215a3d0079bb0b9b2d528e5100cecb1

        • C:\Windows\setupconfig.dat

          Filesize

          14B

          MD5

          96e98a2a56841e4b3de562e9cce0567d

          SHA1

          30a1fb35b2cf587f23a79348f6f53c3917293d1b

          SHA256

          27f8dee93960f38b8b6ab456651a8c09fa26c3724369a9b6648d7ec938e0451d

          SHA512

          2848c904e50b7160e30590c0b90a4bb030bde4984f064d7ad8274d3f2488d38ca952f78a527d0edba4f71dcaf09e3d5e2f5460275f8c7064a5f9e909ddb2c7bf

        • \Windows\PCHEALTH\services.exe

          Filesize

          24KB

          MD5

          469b9f2dc3250a142a60db98eb2622eb

          SHA1

          78165392d4df3275daeacf75a56bab00a892b171

          SHA256

          acf1555792ac1a743c8372da176713084674a735143c5dfa538f1a54141c20a9

          SHA512

          f61c6b6b64ae6bc7686039e77904d966324ea8eb5e55b42001561a521e80c50f00dab068a058633ee9d00b2cda52503f8a37c2bb5973526b23f9af2a0f7f8e7a

        • memory/1832-0-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/1832-1-0x0000000000230000-0x000000000026C000-memory.dmp

          Filesize

          240KB

        • memory/1832-10-0x0000000002950000-0x0000000002960000-memory.dmp

          Filesize

          64KB

        • memory/1832-24-0x0000000000230000-0x000000000023D000-memory.dmp

          Filesize

          52KB

        • memory/1832-23-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB