Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-03-2024 03:03

General

  • Target

    c7852339c20c297a02691e6b16cb69c7.exe

  • Size

    152KB

  • MD5

    c7852339c20c297a02691e6b16cb69c7

  • SHA1

    a04bc6ca673f8cc43ff5802ec1f158e4bb1fae62

  • SHA256

    7eee944a5319a78072ce6ae2f76b5581a0e10abd8656002827eb247dbcfe9e5d

  • SHA512

    7f4cca5f39918818da5443bebb61dbc73266e7130ab748e5c0e467299ea080d88d28709b88129cc723376e05aed533c9d0ca709a8b22fec8a50d7047d6fa1fde

  • SSDEEP

    3072:Xr30nVYoE4weBRoIt/BJg2icxOrBa5XJX9JndT5ql:b4nBDt/BJRic4rgpJXvnd

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7852339c20c297a02691e6b16cb69c7.exe
    "C:\Users\Admin\AppData\Local\Temp\c7852339c20c297a02691e6b16cb69c7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Windows\SysWOW64\regedt32.exe
      "C:\Windows\System32\regedt32.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Windows\SysWOW64\regedit.exe
        "C:\Windows\regedit.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"
        3⤵
        • Runs .reg file with regedit
        PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\Iterra\T03emp03.reg

    Filesize

    217B

    MD5

    98edae8c8480ba90a69a2b4a44355cf2

    SHA1

    8e66a262318c5eff48ab324709ab58d184a17f24

    SHA256

    70264e987f775c94bf73f30c046ec33ec686add3c61515a6f48c76800a6bd2a7

    SHA512

    d8e94c5d271b87b7d8f3590bc05ab601f39f46ed99966d5460e4a20f8880fbfb95f9ff2239cfca315a61782e8b2e55317c5a3572eb63f03f8c283466f19beaea

  • \Users\Admin\Documents\Iterra\xosgfwe.dll

    Filesize

    41KB

    MD5

    88618d48774cc6c82a1d633e886ca4d1

    SHA1

    df2de6fcc9609be6594491cd213c4cbcad1c1265

    SHA256

    c54ce4eae95902973eafa76dbcb0a3c6bf48456e46126cd00400c986ea2932e2

    SHA512

    1182930584e6d4fd32ac5423e9a6f3dab63c32c5a3220debb5354ac73a8e2119c2b6e874a6da0326fd402ce69cd83f6c3839e8f033be0f4252aaada50c38029a

  • memory/1952-0-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1952-2-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1952-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1952-10-0x0000000002610000-0x00000000026E3000-memory.dmp

    Filesize

    844KB

  • memory/1952-8-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/1952-11-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1952-13-0x0000000002610000-0x00000000026E3000-memory.dmp

    Filesize

    844KB

  • memory/1952-19-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB