Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/02/2024, 03:10

General

  • Target

    $PLUGINSDIR/ShopToWin11.exe

  • Size

    168KB

  • MD5

    a5d6bfca2e9a9bf22ea31b1ccca6008e

  • SHA1

    c4dde1b6d21df3374045d53bf040bdcf15fa2337

  • SHA256

    d6353560ab8aac54a927ad839726d63302ca9e9f6a4711d99382a95ec6885cd4

  • SHA512

    9b99d8f6dcfef597e52a05c8cb6938bf5d3126acbe856a3f02b89d663a4b834e65ffbd139fafd6a5c080b950bf30783d87e62a09e1624020eef1ad0cdf8c8d8c

  • SSDEEP

    3072:SjJ7nbppQmJbU4GSE9QYW9zjY37yV0Kxa/dndkDI:Sb6P0E9Tmz83mV0KxiiDI

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ShopToWin11.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ShopToWin11.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nst4FD6.tmp\InetLoad.dll

    Filesize

    18KB

    MD5

    588d2a4e27dee47f1d7a9c10e67ca948

    SHA1

    019aad53a317892c3875761a5f6f2fb470376b7b

    SHA256

    b908ac66f5e0876fefe0be8ee692095132a780a8362ba3a68e99ba0d53dc8ebc

    SHA512

    c9de72dcb87f27e0a67c6b0220dab67b8c5813bc803bd76fb2b3070e88447457afdc76ffc391be42c14e9f31218fb74e8ddcd2a867e1f4d6f057986a8e31955b