Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 19:26

General

  • Target

    bc9ba8017aa857dbf82f32186f7288e2.exe

  • Size

    170KB

  • MD5

    bc9ba8017aa857dbf82f32186f7288e2

  • SHA1

    bb317f6106c8169c84a2644568e3c0313f17a838

  • SHA256

    e54ba544ccc2ca9fe6df97d6327f17a0970d476173e4320677fe7ce58c492b4f

  • SHA512

    1210bc3343fb97260a69377d933e9b3e6f72d3fd81f395b0a32e42a0c4dc5e03b942223744a5da54e0a66f811ada74ca7716848a91454e3b64387f020513186b

  • SSDEEP

    3072:1E9nrc9n/77b8r4ftf9mQdedR4FrgKaVrJ9YbjDtVcF91NaNShzP2+QJEtDxu:1Cc9/L8EtUfIUzfYjDtq91NKl2O

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc9ba8017aa857dbf82f32186f7288e2.exe
    "C:\Users\Admin\AppData\Local\Temp\bc9ba8017aa857dbf82f32186f7288e2.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2300

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2300-0-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2300-1-0x0000000000290000-0x0000000000291000-memory.dmp

          Filesize

          4KB

        • memory/2300-2-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2300-27955-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2300-41074-0x0000000072EC0000-0x0000000073F22000-memory.dmp

          Filesize

          16.4MB

        • memory/2300-41075-0x0000000072EC0000-0x0000000073F22000-memory.dmp

          Filesize

          16.4MB

        • memory/2300-41077-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2300-41079-0x0000000002B80000-0x0000000002B84000-memory.dmp

          Filesize

          16KB

        • memory/2300-41080-0x00000000036B0000-0x00000000036D0000-memory.dmp

          Filesize

          128KB

        • memory/2300-41081-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2300-41083-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2300-41082-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2300-41084-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/2300-41085-0x00000000036B0000-0x00000000036D0000-memory.dmp

          Filesize

          128KB