Resubmissions

13/03/2024, 02:02

240313-cge58ahf8z 7

13/03/2024, 02:00

240313-ce98kshf4w 3

Analysis

  • max time kernel
    78s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 02:02

General

  • Target

    tinytask.exe

  • Size

    33KB

  • MD5

    27c0d8847cf9c01995d98b859c1ce1a7

  • SHA1

    7e90992873d538c5fe8dc9bae310f21a1ad26107

  • SHA256

    041bfb806d735dc68e2fe143d4ef83194164f6ee5f56bd5e793b3d0ae372e187

  • SHA512

    04a134b1d929abcdde4ef6b9e38a64fbc72ce8f66c2750cd6515c9420d2e658f83b12b93b3dd3ab07c1be81a83ff29a9855e09fe798829b18564fc5804e47d7a

  • SSDEEP

    768:6IxCAWKlQIq5azbvizgkw13bVck/MLMZr5Zs:ZgKtJfiG3bVf5NHs

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tinytask.exe
    "C:\Users\Admin\AppData\Local\Temp\tinytask.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1504
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1316
    • C:\Users\Admin\Documents\a.exe
      "C:\Users\Admin\Documents\a.exe"
      1⤵
      • Executes dropped EXE
      PID:628

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Documents\a.exe

      Filesize

      35KB

      MD5

      5d0aa705f27d6c8c552124bf003b6ffd

      SHA1

      f3fc1b5ca03e37a6761af2f105d4917dbb2e2e14

      SHA256

      42da826c88d013dcb125249c04d86e17ed3b0440338605501c148a4816eb189b

      SHA512

      bbbba4b23a079fe2b666fb29242064a7778c2ac172da457bda4f1585e8f360c9af24bcffef9f02e52372beeb6dfc4dfa06f98af81314afe85d3501e343780d2e

    • C:\Users\Admin\Documents\a.rec

      Filesize

      2KB

      MD5

      600af33f409929c1f7d67b3269dc932d

      SHA1

      2f19ad6d4989eca7bf9ad988512e79d0584a6f90

      SHA256

      fe90bb456d0e399a06ca6f7ac93b50fd81428af07c3999341aeeb6f8732b9d0c

      SHA512

      436314ff0e72056a488b9c499e676edfa9f3e8f31216b572625e80f40c714d9238ed286703647222a2e05ef947a469638783ad25de7ce66df990e6b9ca5f91c5

    • memory/1504-0-0x0000000005760000-0x0000000005761000-memory.dmp

      Filesize

      4KB

    • memory/1504-1-0x0000000006730000-0x0000000006732000-memory.dmp

      Filesize

      8KB

    • memory/1504-15-0x0000000005760000-0x0000000005761000-memory.dmp

      Filesize

      4KB