Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/02/2024, 03:01

General

  • Target

    ad858668281c5d4a464a7d7192f88e40.exe

  • Size

    7KB

  • MD5

    ad858668281c5d4a464a7d7192f88e40

  • SHA1

    6bea4b7fd9165e7392ed1489683f387385a72469

  • SHA256

    8a3dfcc82d3f2bb89aca95fb916dda38d1c3ffdfb574db1899a16896a6ccfc65

  • SHA512

    c49d4363c75b558af1a8c0d96213eec8451fb20beb3e0fb956b20564b61005e9f46996a34f2a26b4d649bb75ab323f6a52ca34552096c4e10b6c9381958e74c5

  • SSDEEP

    96:Ai1CGe/m7q3xvuWnYNFWzry4XfETl8GQSOPLpHfnL+liIpsU4+dTkx7:A6CGe/jvueO4qKSqj+McJ4+dT+7

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad858668281c5d4a464a7d7192f88e40.exe
    "C:\Users\Admin\AppData\Local\Temp\ad858668281c5d4a464a7d7192f88e40.exe"
    1⤵
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\delt.bat" "
      2⤵
      • Deletes itself
      PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\delt.bat

    Filesize

    301B

    MD5

    dafeb4854b6a9d303458a723fd47b04c

    SHA1

    d41398227982d150e7ab6ea401ff95c95d1c3d73

    SHA256

    83194b78f244cb13a4103040d2100392aa61c55f95aa9d498bb2d89d5f59cc56

    SHA512

    4607baaf424fce1decc1f1e836c224cb8705ebb7f6001ee830108b38f5819b2902271b0d2612a205d367748dcc9e2eb8f9a7d51c0863454038e8b990a03808c6

  • memory/2224-9-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB