Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 20:46

General

  • Target

    79944b1379a7511c17c2d37484e729b740751c4d8071ec46d10e8c274eb0fd74.exe

  • Size

    224KB

  • MD5

    87a2a67ea195d5f7a628e79c113f3611

  • SHA1

    9e34ca860fe91402e679587634d8fd35b6d16d5e

  • SHA256

    79944b1379a7511c17c2d37484e729b740751c4d8071ec46d10e8c274eb0fd74

  • SHA512

    fd88f78954a7d827df83ebd68a846feead0fa20972b555e71baef98e4bcd19fffec4179e679e306ca7327ec7a8fbdb98c056662c4d2ade4e5c966f119b39a89b

  • SSDEEP

    3072:8b3N87hBQtfZV7l2mclfj4Uvx+9sNxu+2eRcKgsU61JkkX39RLrw4ySKUbax2+gm:ANXp74L76nrZ3X

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79944b1379a7511c17c2d37484e729b740751c4d8071ec46d10e8c274eb0fd74.exe
    "C:\Users\Admin\AppData\Local\Temp\79944b1379a7511c17c2d37484e729b740751c4d8071ec46d10e8c274eb0fd74.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Users\Admin\diobox.exe
      "C:\Users\Admin\diobox.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2584

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\diobox.exe

          Filesize

          224KB

          MD5

          2e90770f915392c879e4702f9dc1ba58

          SHA1

          8bf5cbf2911047b5344db7918f1d8f13d02c68da

          SHA256

          55113dcbdb23472dec82fb6dae20999e8e094576c26a9041efe7f7cd13dcc841

          SHA512

          0df9731871d7bcd90f36d1be5fa78e7297189ba4651636f076b17d0c42ba85aa9af0bbf8e3db402b9eb518842218eaa93ce3be659ce1f5b3b9e4c90371a75e3f