Analysis

  • max time kernel
    118s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 17:00

General

  • Target

    6e65b6227458e88fc62dc27651515e7997fbaf2d50f18a7ba2f3133189bd039a.exe

  • Size

    897KB

  • MD5

    e80fc26f1009f12381ab706938fa5f89

  • SHA1

    51425f70a09f9a16cd3c3fbe293d025278442bd9

  • SHA256

    6e65b6227458e88fc62dc27651515e7997fbaf2d50f18a7ba2f3133189bd039a

  • SHA512

    8aa90308e8fd8a765139225a721f90a8f8758686dded7d46abb58ea0eb071d46ec7fb33ed7c057afbcfe999597a36fa255848024885f5e2b8f1b7bad8bd1a9fc

  • SSDEEP

    24576:w5ipcw+IBevo6iglbAfrKa98Cu5cyUBJ8Dq2S04:X+eeA5RuW83qfB2q2s

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e65b6227458e88fc62dc27651515e7997fbaf2d50f18a7ba2f3133189bd039a.exe
    "C:\Users\Admin\AppData\Local\Temp\6e65b6227458e88fc62dc27651515e7997fbaf2d50f18a7ba2f3133189bd039a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Users\Admin\AppData\Local\Temp\6e65b6227458e88fc62dc27651515e7997fbaf2d50f18a7ba2f3133189bd039a.exe
      C:\Users\Admin\AppData\Local\Temp\6e65b6227458e88fc62dc27651515e7997fbaf2d50f18a7ba2f3133189bd039a.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • System policy modification
      PID:1828
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1768
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2988

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\Local\Temp\Tar76AB.tmp

      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • \Users\Admin\AppData\Local\Temp\6e65b6227458e88fc62dc27651515e7997fbaf2d50f18a7ba2f3133189bd039a.exe

      Filesize

      897KB

      MD5

      3ea4c075c9e1d96438b53d1c41bee44e

      SHA1

      743cb3dc8be8086409b5b0f938d16c5bb6555411

      SHA256

      94dd41bc5871d5a61c2506a7252672dca4e8eea40bba0000c963487aa318a191

      SHA512

      024ee31855f623859a79b220a60879b1c143fa3072bd9706e504ed41545a7b42f254438f3ffa4de6ed36677784e4b9555a42749154830311c13259e7f9eeba3c

    • memory/1828-12-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/1828-13-0x0000000000360000-0x00000000003DD000-memory.dmp

      Filesize

      500KB

    • memory/1828-20-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/1828-11-0x0000000000400000-0x000000000047D000-memory.dmp

      Filesize

      500KB

    • memory/1828-65-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/2748-6-0x0000000002CD0000-0x0000000002D4D000-memory.dmp

      Filesize

      500KB

    • memory/2748-0-0x0000000000400000-0x000000000047D000-memory.dmp

      Filesize

      500KB

    • memory/2748-9-0x0000000000400000-0x000000000047D000-memory.dmp

      Filesize

      500KB

    • memory/2988-67-0x00000000042E0000-0x00000000042E1000-memory.dmp

      Filesize

      4KB

    • memory/2988-68-0x00000000042E0000-0x00000000042E1000-memory.dmp

      Filesize

      4KB