Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 21:37

General

  • Target

    c6ebc13b434ecb4a7f21ca45ff7c7a25.exe

  • Size

    4.3MB

  • MD5

    c6ebc13b434ecb4a7f21ca45ff7c7a25

  • SHA1

    d2804818acd2b3e470253d8f4d86b428dc1f0d8e

  • SHA256

    41981d5a3cc992589d944d6cf279a48f72c99c360a7aac705b40ce1e97a284a3

  • SHA512

    f5230feb9a551e18bc69df3a9daa8e023b6c41607a1d66838e3599485bcab4c8bff1aa43afb25dabc39279b19433fdc54ef5561e539b211d2c52cff41a3a3fbc

  • SSDEEP

    98304:TuJmYdNeRQRkbYUnhs/qhgs9kSZhJyI4fOVPoY:Tu44eikbY4u/qhgFSZmOqY

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6ebc13b434ecb4a7f21ca45ff7c7a25.exe
    "C:\Users\Admin\AppData\Local\Temp\c6ebc13b434ecb4a7f21ca45ff7c7a25.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsyA7D.tmp\ioSpecial.ini

    Filesize

    647B

    MD5

    8202709bc00bccc56a3bb9b9bcf7e605

    SHA1

    2d9643536ea84cb5dcb352e32856c01663b6dbc8

    SHA256

    d4f08a9bc9ebecfde537fbfc42237c497dd2f31c4cb77919e486e57b46bcbe0b

    SHA512

    65cab461c1a8ce35845bbe59be0ca80cd8229da05a12eb168a1707630769b23416cd3da8b1c519c468f48abf163431cf4d6e2b119e08fe8161dd5de537aeaee1

  • \Users\Admin\AppData\Local\Temp\nsyA7D.tmp\ChkClient.dll

    Filesize

    140KB

    MD5

    3fe47e461bb686693cf440c8815f2a0b

    SHA1

    9a7d27d47a542b83d00f1e6027ba4c22d496f887

    SHA256

    5bdefe9a081e5e2f4af73891db6228a6b57e7dd320fac0ae233f5cd741db8a1f

    SHA512

    687c57e17c4f527b90e8eafa9929fa9ee0a1fa82b2c9ba9c6a6385cfcb1fcdd1e09305acbf357cf61e7dd7e061d581a378d2661ed7df7dbfd554514f04646e61

  • \Users\Admin\AppData\Local\Temp\nsyA7D.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    eef9e469e8a30717974499f277d97e2a

    SHA1

    2d33c25984ebd9116beeb55cdde4c5c86c023e5d

    SHA256

    1f35bb6728237483c779005fc227e69fef51b0bafd32d15855d483948a337078

    SHA512

    d860132106a1c03dfa23f983b3c503f1216ac02f3d47833b96dfb333fb30bc8ab4d4fecd1f1f0a89f0c7f3586405461e2d53c26f282bb48970e549659b364b48

  • \Users\Admin\AppData\Local\Temp\nsyA7D.tmp\IsVista.dll

    Filesize

    44KB

    MD5

    344d13fd0fdd2d97e8d61960f40a8a30

    SHA1

    3f0f120203005eea3e8ed1652a6ea8a607ea934d

    SHA256

    17bb3331e2300aa01666fbee98b9552cec5e46212a4c5a340c0370b93df88f83

    SHA512

    b4e49c58503532e270cc369f1cbd14d85edd46da5ab034dad730bd4297887dd541d445d2fbf205820e6afbbdba7ab6d5b78b694467554320fd6db8e06fe4f719

  • \Users\Admin\AppData\Local\Temp\nsyA7D.tmp\Ischeck.dll

    Filesize

    120KB

    MD5

    6c1f65ce96712e05f64c7a26b7adee36

    SHA1

    6cea6c2618fb31902c52cb1d5fad04503bd34ed0

    SHA256

    544f3c2c03f7900539d4868437f8e08204c0b4c79357af666a1fb48d406c1ffd

    SHA512

    5244d26d013dc2c7083bd4c167cac99307985babcabc1806a898a2621fce6b73d256b21d549bce8744f3221a51017ea5f621d2f6f5cd5aae83ec21ae41e5d5a6

  • \Users\Admin\AppData\Local\Temp\nsyA7D.tmp\stack.dll

    Filesize

    10KB

    MD5

    0f61a81a543822de5fcb9a8a43f230dd

    SHA1

    d01d4a0f542f3c654637fdfe5a574fe1f150ece1

    SHA256

    46b4a72ae8590b0afb3304cc5c13db0502bc4c4cb02f64f37c79008c17db814f

    SHA512

    596b7a897ba64c32e26ba6168aa3628aad37b187a9814a286298307d8c42eabf8e8a679dbda558f8b2cdc8676c94ec819256432aa5ad7c05a5387759262a4402

  • memory/3056-9-0x00000000003D0000-0x00000000003F7000-memory.dmp

    Filesize

    156KB

  • memory/3056-16-0x00000000003D0000-0x00000000003DC000-memory.dmp

    Filesize

    48KB

  • memory/3056-22-0x00000000003D0000-0x00000000003F2000-memory.dmp

    Filesize

    136KB