Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 22:48

General

  • Target

    SmartTool.exe

  • Size

    42KB

  • MD5

    d1859658605c11d217cb9d3e0540ca61

  • SHA1

    1e2cb13bdbe6c6e6568a127258d7df38e67e26d5

  • SHA256

    7b9fd7ea1c9dc710f67d3066369f51bf5fc4002062b356a2f53038b02c79fce0

  • SHA512

    5b144619b2b4d97724fcbb850c8041f020f1b44494121ce42a8949280c8570fb8cd9213e7d467eb695364c6ae31e8b83e08e609e55473c933e0828fed3ad052f

  • SSDEEP

    384:J5ifwRFKhAcAELTLCT5/M7Ygi6RYm59Pe18WJ07c4xJ4YJLuPkCQu:6wRlcvCT5+06CHJ0A4xJNLuD

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 46 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SmartTool.exe
    "C:\Users\Admin\AppData\Local\Temp\SmartTool.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s "C:\Users\Admin\AppData\Local\Temp\SmartTool.dll"
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:4036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads