Analysis

  • max time kernel
    163s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2024, 17:24

General

  • Target

    a45c180893d07ad8b8bac4f89e3ffcda.exe

  • Size

    2.0MB

  • MD5

    a45c180893d07ad8b8bac4f89e3ffcda

  • SHA1

    96289ac5daa11a54be812f1324a343c33580430e

  • SHA256

    58b50486698b3f166fb5aaf9ce08dc2f05a2732e8263507b8dcea62034ca6230

  • SHA512

    852b6a529f3740295412a1507955bf13b7b422d122b43f3f3b4c1d497eda65cc43483da6de8433789bd079139c1c0aa47203bb684b477737a518b239d601c472

  • SSDEEP

    49152:OFUcx88PWPOpX0SFDBCyLk8rc/+bPQRW5pAEyGc:O+K88uPCHtiT/+bouAEyGc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a45c180893d07ad8b8bac4f89e3ffcda.exe
    "C:\Users\Admin\AppData\Local\Temp\a45c180893d07ad8b8bac4f89e3ffcda.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Users\Admin\AppData\Local\Temp\C6D8.tmp
      "C:\Users\Admin\AppData\Local\Temp\C6D8.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a45c180893d07ad8b8bac4f89e3ffcda.exe 4CAE343A1BB6CC770BFA6B5A42314E0B4AEF9E784DC021C6491CD7909E621DAB045592720A86FC4BBD1820C14EEB0FF18DE72CA0744D4065B9F4E473B66C1304
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\a45c180893d07ad8b8bac4f89e3ffcda.docx"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\C6D8.tmp

    Filesize

    1.5MB

    MD5

    f86b2050fe1922cb914900896944d52a

    SHA1

    2d52aa9fab0720c6b488b216a6a8de67af3369ca

    SHA256

    35f7a7f11df4c264ca72ea92fe4ca95a02487ade38488e6bb47e4e56046b88f2

    SHA512

    3863efdca967e557cbb18a499a4137211974d826f804937fe44dd111350f1a51e7fb07c3d92a9cefee24ac680669cc0618a2708fe29f243aeb3960f10c4a1d57

  • C:\Users\Admin\AppData\Local\Temp\a45c180893d07ad8b8bac4f89e3ffcda.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • \Users\Admin\AppData\Local\Temp\C6D8.tmp

    Filesize

    2.0MB

    MD5

    53e3e9dfb7e9426570ef9b4011d7f9a7

    SHA1

    275e1f5b54bb252ade4985c914216d0bc85f2521

    SHA256

    e0b768132c8135e54d0bec0d8c15400351c0b01dfb6c5560e0ecae8d3cda2dd7

    SHA512

    696a36bc377f9e62d507a900965d4731450fce4900046efb55c25ea65fdeb6fabd28099c25d289614ece402c5656018da75c8b6b5c960b89bf9a55d6ef78e2be

  • memory/1692-0-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/2500-6-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/2556-9-0x000000002FB81000-0x000000002FB82000-memory.dmp

    Filesize

    4KB

  • memory/2556-10-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2556-11-0x0000000070F7D000-0x0000000070F88000-memory.dmp

    Filesize

    44KB

  • memory/2556-15-0x0000000070F7D000-0x0000000070F88000-memory.dmp

    Filesize

    44KB