Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 02:42

General

  • Target

    c240a73a05930190ba6b26305dbd03b5.exe

  • Size

    236KB

  • MD5

    c240a73a05930190ba6b26305dbd03b5

  • SHA1

    383a799396a66931166edf46963cafde458ac635

  • SHA256

    c26b7e05d554cae91b4bba25b8d7e408b8277402b36ed469dd83f49491e30460

  • SHA512

    7c7d7f179682affc804d4517432e31e3849ef40722e60389564e22900bc68508329d42ac5f05ff1b1cd589e54973762f7fb7f9ccbf8c9e954d0dbdf7253ee401

  • SSDEEP

    6144:2wmR1EzYbPCS8WsD7s0FU6ykbsdb/y99z9tnL9O99999N9999V999996999WLf9u:2J

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c240a73a05930190ba6b26305dbd03b5.exe
    "C:\Users\Admin\AppData\Local\Temp\c240a73a05930190ba6b26305dbd03b5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\cwtum.exe
      "C:\Users\Admin\cwtum.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\cwtum.exe

    Filesize

    236KB

    MD5

    c3f592b9b505a15838d13c7c44c7415a

    SHA1

    e66166124e7ef5738fafb3a13c3db5748a74949a

    SHA256

    e18d0bac3773d9e20cfa3015398a62053c51093fbccc12827dc36261535d82d2

    SHA512

    b2db3d3fdb09975791bfdd4a823dd9456b4b2449406f57efaad23070fdfa38eb4b7aa9417b0aeb34935e9af1f95960a79eda731b05ed0372350cb6fc346c6f3b