Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-03-2024 23:39

General

  • Target

    bd1aba56509d9794f1890bc856bfb108.exe

  • Size

    117KB

  • MD5

    bd1aba56509d9794f1890bc856bfb108

  • SHA1

    425eb2d5a2d0911c8593cf4fd567f5ab6678f9c6

  • SHA256

    7bf782da37a9be84143e98708ce454bc9a4e5fba419ea37bb389148fb65ab439

  • SHA512

    e2ca43819a0051ef2b101363025d39cdcea1ce8c5179e6ce7cfa5569f4d23e8f72a642da64849670152d81cc3303af7ab5937f2d9bfbc09b264c3ab825c3e830

  • SSDEEP

    3072:nitZk16XnyVhtVpjS1CEfeBpJiPFiFi7pC:niBXny7ZTB4iFP

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd1aba56509d9794f1890bc856bfb108.exe
    "C:\Users\Admin\AppData\Local\Temp\bd1aba56509d9794f1890bc856bfb108.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c 2.bat
      2⤵
        PID:2800
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c 2.bat
        2⤵
          PID:4140

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\2.bat

        Filesize

        47B

        MD5

        5c1536be124bd0576c2edc0cb4672181

        SHA1

        7c753e2e06d10b9c601aaa67f4f8e9318b5d013e

        SHA256

        3555745f02782dce72274c490aa782f1f64668ea6f0a799bae32649426b27d8c

        SHA512

        7a8fc70a2731f9ba37786dfeace61abaeb45021457dae0e874c2d8c2a7210b344f64799eb0668ad38cdb4af8a4589fd1edf959cdae3f53a85c0bab100dbbb28b

      • C:\Users\Admin\AppData\Local\Temp\2.bat

        Filesize

        89B

        MD5

        a68dac05ba13b3b2423646b782d9a3ca

        SHA1

        5bc5372b14ff5ec35a2ff7f6376fdfa83413ef50

        SHA256

        ece25cc10a1bd2f31eff3b1c001284a3788c3d422c681e8387d562fa17eef5b1

        SHA512

        d6d9f41c5a61903cf91f9b22af9947841aa7e50739fbb4cdf294d3bb1660b5b76caa5da8d7fa4a5fac56bea1626b34338f3acf2cbd5f6a086195ff2a20eb5c7d

      • C:\Windows\debug\29124D4AA81F.dll

        Filesize

        103KB

        MD5

        3e9bfcf6513a3569616b02314bc84c82

        SHA1

        2eb517320d7fb253b3b9471e72aa5816f8c1a799

        SHA256

        3b3e32fad3592320860e2f6da9d3a1abfb4aec709fad5ecb8df6ecc10ba5f695

        SHA512

        cc45678b9b6753f5c21c8dc3f4384bacdbf1db8856b2a23ac5bb78ed3799a8cfc866b7b17c1d9642782e30241a231f932e08462764c03419733a12b15aa3fe5a

      • memory/2364-15-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2364-6-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2364-1-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2364-0-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2364-17-0x0000000002150000-0x0000000002198000-memory.dmp

        Filesize

        288KB

      • memory/2364-18-0x00000000001C0000-0x00000000001C2000-memory.dmp

        Filesize

        8KB

      • memory/2364-19-0x0000000002150000-0x0000000002198000-memory.dmp

        Filesize

        288KB

      • memory/2364-2-0x00000000001C0000-0x00000000001C2000-memory.dmp

        Filesize

        8KB

      • memory/2364-21-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/2364-23-0x0000000002150000-0x0000000002198000-memory.dmp

        Filesize

        288KB