Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-02-2024 15:40

General

  • Target

    ac3d6f82efc28843b3fccaf4bd61eb8e.exe

  • Size

    248KB

  • MD5

    ac3d6f82efc28843b3fccaf4bd61eb8e

  • SHA1

    c2c0bb88bc2a6cda7718861423dfae5213e37c94

  • SHA256

    ff006bbebe733e0a28b5d7398a9c1be5886fef0dcde1bb34421122dea5abb5cf

  • SHA512

    65e15f2e8553497b08c3efb83b28f1e38fe3b568e660cd205e09bb29e2f85edda1a9557dd89743ad8de2e0d25b33eac77cb3641d697791b12bc1731d994fc5f7

  • SSDEEP

    6144:VYQ/4u8ccm6HgId+7UDiKk7Wr5fxcq5dQeBACpmUjrgUBDlc7WsUzem2K2wJrNfa:/Qu8cc3HgI87IiKk7Wr5Jc6gUcWsUiln

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac3d6f82efc28843b3fccaf4bd61eb8e.exe
    "C:\Users\Admin\AppData\Local\Temp\ac3d6f82efc28843b3fccaf4bd61eb8e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\seoeci.exe
      "C:\Users\Admin\seoeci.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\seoeci.exe

    Filesize

    248KB

    MD5

    5824e2a37e4242ef0fcd00293f14f68b

    SHA1

    3a9e93c82dce91569badf454482cf413ed02864f

    SHA256

    b76f7488cfd47662213044a91eb1809922f388051eb8ce39b9bb67924f4a956a

    SHA512

    d0e76a0bda0c9573da18fec0bcb8e15626d92ed45036b1074c67b564df11f8cfb50f560fe4ffed0587347097de2243e49cd20bbe1a833d03c736f02bccc3b7e5