Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2024, 16:02

General

  • Target

    bf04efdb7e1d144588d9a6e32ea99602.exe

  • Size

    6KB

  • MD5

    bf04efdb7e1d144588d9a6e32ea99602

  • SHA1

    a3aec13fa47b19e29771f72233f92adc10e67d56

  • SHA256

    e0fb80ecb1ecc3b07b11a0f1d4ff023e6435af304173f40ce3ecde9216b236e8

  • SHA512

    27f11620d72c01b9c4db6771524972ebb9cdf2fdeadf3571a72b16dc41f20c00e9a5608a1a92907987593f3b13a460e9af15dd5355f3dc788b594d36beee1654

  • SSDEEP

    96:QPaLcNTLyYABhaTnC0z0nR7g5E7Gj67OGk:QigR+YAB6z0niWU67O1

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf04efdb7e1d144588d9a6e32ea99602.exe
    "C:\Users\Admin\AppData\Local\Temp\bf04efdb7e1d144588d9a6e32ea99602.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4904
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 "C:\Windows\Installer\{e6dfc6c6-03bc-44b0-9858-d2c4eaa9b8fa}\DriveAlrt.dll",service
      2⤵
        PID:2948
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c c:\tempdel.bat
        2⤵
          PID:3044
      • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
        "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
        1⤵
          PID:4728
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2552
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:17410 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3460

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PICZ11Q6\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • C:\Windows\Installer\{e6dfc6c6-03bc-44b0-9858-d2c4eaa9b8fa}\DriveAlrt.dll

          Filesize

          42B

          MD5

          2bfee19f39c3579421edb5ff4a2b4da3

          SHA1

          3da91933da3e2b195f4b2ce152cb87e93084e717

          SHA256

          9a2a0662140220252ec0bd86d5c67821fefc28b2ae3b004706e44f7290581c29

          SHA512

          bd1c6b9467a51a3573c39977040952ed31380724b0cf144c5fbff16ff86de15b587ae5df860a70d983c98ee700bb556d39f938a7fcc52d77a2ab0fb8d788bec1

        • \??\c:\tempdel.bat

          Filesize

          204B

          MD5

          6b093994e3e9bf11675f3bdbfec26c4a

          SHA1

          0dd73b8ce7634c1da5965c1e9a3d9c6b20c2061e

          SHA256

          489a274aa3d2f53e22b114b8afe12c7e9fa0f3b8d49c588d7d0e400dd4c091a2

          SHA512

          e689b58f3814c652b074d00717e8958888b528b38282ec4de748831b13fa36352fcafb45467621fecf43d0c7d8640cd27ceb0972481c3c15bbec8825f923fa26