Analysis

  • max time kernel
    143s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2024, 04:39

General

  • Target

    bfddcea5454a7997305696541e6d6347.exe

  • Size

    286KB

  • MD5

    bfddcea5454a7997305696541e6d6347

  • SHA1

    2885d22411b1a0f5565e0542bb38c0a3cf7a0e4d

  • SHA256

    6f6f647a9bafb8dfd42593d4d77abdd05947bc6a49716b79fbbc1a51f293079d

  • SHA512

    2a404382475c49f150a30eb283811002da5ba848988d8c139a653f72b2bdb41878b32c885c6a5dcef6e0c9e36ed98d6edd7f5c6b6efbcd4fc7f79a2bf1b6a205

  • SSDEEP

    6144:23MrONR1cNwPLvoqg0R2VhPefm0ToyugupkXHykED/m0eNGGs:o171c2obY7WDK3yh/n

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfddcea5454a7997305696541e6d6347.exe
    "C:\Users\Admin\AppData\Local\Temp\bfddcea5454a7997305696541e6d6347.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Windows\SysWOW64\agetlksyiey.exe
      "C:\Windows\system32\agetlksyiey.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\agetlksyiey.exe

    Filesize

    286KB

    MD5

    bfddcea5454a7997305696541e6d6347

    SHA1

    2885d22411b1a0f5565e0542bb38c0a3cf7a0e4d

    SHA256

    6f6f647a9bafb8dfd42593d4d77abdd05947bc6a49716b79fbbc1a51f293079d

    SHA512

    2a404382475c49f150a30eb283811002da5ba848988d8c139a653f72b2bdb41878b32c885c6a5dcef6e0c9e36ed98d6edd7f5c6b6efbcd4fc7f79a2bf1b6a205

  • C:\Windows\SysWOW64\psapi.lib

    Filesize

    19KB

    MD5

    a5b1b1f7c2c51ff400d93ae63f484d96

    SHA1

    5f038003bf8851254ba577db5d8dfd69c1085c33

    SHA256

    35b1d2d2bc5c531d49aa3550de5c19bd5f4ebe79c594c6f5000d6de28b2621bf

    SHA512

    90c2145b39611bd1406c513dff16366a51e86e8831c34ab15f650e6620a75533e800db056dda2e7e176fac8b20cd0be76bc1725b45930b31595d4aac00da4eec

  • memory/2164-20-0x0000000000730000-0x0000000000731000-memory.dmp

    Filesize

    4KB

  • memory/2164-19-0x00000000006B0000-0x00000000006B1000-memory.dmp

    Filesize

    4KB

  • memory/2164-7-0x0000000000490000-0x0000000000491000-memory.dmp

    Filesize

    4KB

  • memory/2164-6-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2164-5-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2164-4-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2164-3-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2164-2-0x0000000000480000-0x0000000000481000-memory.dmp

    Filesize

    4KB

  • memory/2164-17-0x0000000000520000-0x0000000000521000-memory.dmp

    Filesize

    4KB

  • memory/2164-16-0x0000000000660000-0x0000000000661000-memory.dmp

    Filesize

    4KB

  • memory/2164-18-0x00000000006C0000-0x00000000006C1000-memory.dmp

    Filesize

    4KB

  • memory/2164-15-0x0000000000690000-0x0000000000691000-memory.dmp

    Filesize

    4KB

  • memory/2164-24-0x00000000004A0000-0x00000000004A5000-memory.dmp

    Filesize

    20KB

  • memory/2164-21-0x0000000000740000-0x0000000000741000-memory.dmp

    Filesize

    4KB

  • memory/2164-23-0x0000000000720000-0x0000000000721000-memory.dmp

    Filesize

    4KB

  • memory/2164-22-0x0000000002060000-0x0000000002061000-memory.dmp

    Filesize

    4KB

  • memory/2164-8-0x0000000000460000-0x0000000000461000-memory.dmp

    Filesize

    4KB

  • memory/2164-0-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2164-14-0x0000000000650000-0x0000000000651000-memory.dmp

    Filesize

    4KB

  • memory/2164-13-0x0000000000640000-0x0000000000641000-memory.dmp

    Filesize

    4KB

  • memory/2164-12-0x0000000000500000-0x0000000000501000-memory.dmp

    Filesize

    4KB

  • memory/2164-11-0x0000000000510000-0x0000000000511000-memory.dmp

    Filesize

    4KB

  • memory/2164-10-0x0000000000680000-0x0000000000681000-memory.dmp

    Filesize

    4KB

  • memory/2164-9-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2164-40-0x00000000004B0000-0x0000000000500000-memory.dmp

    Filesize

    320KB

  • memory/2164-1-0x00000000004B0000-0x0000000000500000-memory.dmp

    Filesize

    320KB

  • memory/2164-39-0x00000000042D0000-0x0000000004328000-memory.dmp

    Filesize

    352KB

  • memory/2164-37-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2164-36-0x00000000042D0000-0x0000000004328000-memory.dmp

    Filesize

    352KB

  • memory/2164-29-0x00000000042D0000-0x00000000042E0000-memory.dmp

    Filesize

    64KB

  • memory/2812-43-0x0000000000880000-0x00000000008D0000-memory.dmp

    Filesize

    320KB

  • memory/2812-41-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB

  • memory/2812-45-0x0000000001CE0000-0x0000000001CE1000-memory.dmp

    Filesize

    4KB

  • memory/2812-46-0x0000000000400000-0x0000000000458000-memory.dmp

    Filesize

    352KB