Analysis

  • max time kernel
    142s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2024, 18:37

General

  • Target

    0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23.exe

  • Size

    301KB

  • MD5

    9856e16d3fcfacdb5d00f51261f31908

  • SHA1

    33199c0d1845352a1629c84f97551c03d61a9786

  • SHA256

    0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23

  • SHA512

    721419040e7a4d923b91c5c193f6d7aeff2effd0b879f210d3245fec8152044483d216da2a4ea22e53f9834e02f3744a1cdcd3847611dfa91bb0f3dd19608adb

  • SSDEEP

    6144:c+LjhEB1aWggNOpqY8zzBZ9iEVXZZNTlCdXxiIDuYh:c+Llmdgg4nyXZZZNT6hXDr

Score
9/10

Malware Config

Signatures

  • Detects executables packed with ConfuserEx Mod 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23.exe
    "C:\Users\Admin\AppData\Local\Temp\0523ed65354b50c8acec726a3aab978b6c658eeae7f8b793bc33e7ceb0febe23.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\dfs23D6.tmp

    Filesize

    608KB

    MD5

    6ad886fddcec2a8bd3d7ff4b18bbdf04

    SHA1

    35bea8f3e88d61c37fee34411f245ba1204f27e1

    SHA256

    e31480f82305ffd0cbe33596006405ad9cc6bcbd91143ac236a180500a1996f1

    SHA512

    64c1e29aafc55e05d22dd8c3ede6b0aa3a09438c7074f699cdfed999b5197ab46466bf796e00e4c99236200d295e39fec57f1e8a7c80223fd478264a84954296

  • memory/1644-0-0x0000000000E70000-0x0000000000F36000-memory.dmp

    Filesize

    792KB

  • memory/1644-6-0x00000000748C0000-0x0000000074FAE000-memory.dmp

    Filesize

    6.9MB

  • memory/1644-5-0x00000000047A0000-0x000000000483E000-memory.dmp

    Filesize

    632KB

  • memory/1644-7-0x0000000000270000-0x000000000027A000-memory.dmp

    Filesize

    40KB

  • memory/1644-8-0x0000000004990000-0x00000000049D0000-memory.dmp

    Filesize

    256KB

  • memory/1644-9-0x0000000004990000-0x00000000049D0000-memory.dmp

    Filesize

    256KB

  • memory/1644-10-0x0000000004990000-0x00000000049D0000-memory.dmp

    Filesize

    256KB

  • memory/1644-16-0x000000000B150000-0x000000000B8F6000-memory.dmp

    Filesize

    7.6MB

  • memory/1644-21-0x0000000000E70000-0x0000000000F36000-memory.dmp

    Filesize

    792KB

  • memory/1644-22-0x00000000748C0000-0x0000000074FAE000-memory.dmp

    Filesize

    6.9MB

  • memory/1644-23-0x0000000004990000-0x00000000049D0000-memory.dmp

    Filesize

    256KB