Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 01:42

General

  • Target

    c4a6a667d280bf58172d70b5cc2ab283.exe

  • Size

    104KB

  • MD5

    c4a6a667d280bf58172d70b5cc2ab283

  • SHA1

    591be136c30f6141ca137fb5259fc0d1e1e8c956

  • SHA256

    6fdf71cc2e23c89add7da89bd3960d20f65ab166d5d3facdb739bde5950d3df2

  • SHA512

    2e2dc85a4c4e6a61a1d666d23d1aec9244725e83a25d960fc641acf65e8ce2e51402791bc2af74c697472b1a3f852e371a0a4de955013d04dc90c3d04355705b

  • SSDEEP

    1536:S6HGhwSsky22UJ826eeJo5FRfW5RWTiXJ3j++PObZJTA5:S6HGhGkckeJoFfYWTiXJ3i+AZJ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4a6a667d280bf58172d70b5cc2ab283.exe
    "C:\Users\Admin\AppData\Local\Temp\c4a6a667d280bf58172d70b5cc2ab283.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s
      2⤵
        PID:2012
      • C:\windows\SysWOW64\cyavznuc.exe
        "C:\windows\system32\cyavznuc.exe" -kill c:\users\admin\appdata\local\temp\c4a6a667d280bf58172d70b5cc2ab283.exe /install
        2⤵
        • Deletes itself
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s
          3⤵
            PID:2148
          • C:\windows\SysWOW64\cyavznuc.exe
            "C:\windows\system32\cyavznuc.exe" -kill c:\windows\syswow64\cyavznuc.exe /install /install
            3⤵
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2580
            • C:\Windows\SysWOW64\regsvr32.exe
              "C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s
              4⤵
                PID:2760

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Windows\SysWOW64\cyavznuc.exe

          Filesize

          104KB

          MD5

          c4a6a667d280bf58172d70b5cc2ab283

          SHA1

          591be136c30f6141ca137fb5259fc0d1e1e8c956

          SHA256

          6fdf71cc2e23c89add7da89bd3960d20f65ab166d5d3facdb739bde5950d3df2

          SHA512

          2e2dc85a4c4e6a61a1d666d23d1aec9244725e83a25d960fc641acf65e8ce2e51402791bc2af74c697472b1a3f852e371a0a4de955013d04dc90c3d04355705b

        • memory/2196-0-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2196-10-0x0000000002420000-0x000000000243A000-memory.dmp

          Filesize

          104KB

        • memory/2196-11-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2580-19-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2588-12-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB