Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-03-2024 01:24

General

  • Target

    bd4b11e40d1ebd839d02e668c097f018.exe

  • Size

    80KB

  • MD5

    bd4b11e40d1ebd839d02e668c097f018

  • SHA1

    64bd5768eb0cfe54f9ffa8daef429ceb9879c235

  • SHA256

    d3ac9178b6e07b4331c00abbbbc84d92731acf53332bb4986a14815d9e29dbcb

  • SHA512

    842c8f5d49f597420e023050374b1754ea770fe589f131e247fa37b2d3734fa27f5cb6564b1fee52e110b35443a07266362a253695686faebcc3693853e545e6

  • SSDEEP

    768:EyLwrBwCZM/gQUGHeBPY9ogmu3x88w9NtvDHvGk5Lak7R9uDNIXNldBkaQkTHxVX:HtLUKt3x899NtrOCrlXklgV

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd4b11e40d1ebd839d02e668c097f018.exe
    "C:\Users\Admin\AppData\Local\Temp\bd4b11e40d1ebd839d02e668c097f018.exe"
    1⤵
    • Adds policy Run key to start application
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Windows\SysWOW64\run.exe
      "C:\Windows\system32\run.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\run.exe

    Filesize

    80KB

    MD5

    bd4b11e40d1ebd839d02e668c097f018

    SHA1

    64bd5768eb0cfe54f9ffa8daef429ceb9879c235

    SHA256

    d3ac9178b6e07b4331c00abbbbc84d92731acf53332bb4986a14815d9e29dbcb

    SHA512

    842c8f5d49f597420e023050374b1754ea770fe589f131e247fa37b2d3734fa27f5cb6564b1fee52e110b35443a07266362a253695686faebcc3693853e545e6

  • memory/1224-0-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1224-6-0x0000000000460000-0x0000000000470000-memory.dmp

    Filesize

    64KB

  • memory/1224-13-0x0000000000470000-0x0000000000486000-memory.dmp

    Filesize

    88KB

  • memory/1224-17-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1224-19-0x0000000000460000-0x000000000046D000-memory.dmp

    Filesize

    52KB

  • memory/2940-15-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB