Analysis

  • max time kernel
    144s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 06:44

General

  • Target

    c7f417385ad0909471abb17da32f75e9.exe

  • Size

    2.0MB

  • MD5

    c7f417385ad0909471abb17da32f75e9

  • SHA1

    20df3daa270245d824d2865be62472855aab07e0

  • SHA256

    4a41a8590ff1cb55010f8d78a8e3389090bd107c928e1299ca21d1c9ccc52baa

  • SHA512

    7ca50838077c0439b1c12f0d8794bdc5d8ec8dc3530e05610fd31a29a863f0883eb18c40ee54d454d531cf99030805d24774e0a20965b7f47617806b800ffac0

  • SSDEEP

    24576:tNZA1N2q9OlKwGQc8mpxPWPOuwxX06rdFHlD3Wm/ic/rp2+orCHzIZhB542LfCYb:OFUcx88PWPOpX0SFdB59NkR/VNJEzyGc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7f417385ad0909471abb17da32f75e9.exe
    "C:\Users\Admin\AppData\Local\Temp\c7f417385ad0909471abb17da32f75e9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\55BE.tmp
      "C:\Users\Admin\AppData\Local\Temp\55BE.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c7f417385ad0909471abb17da32f75e9.exe AC9AB9DB404DBA016074FA51C32C4F1C2F3480482DA7483C13F45F7A4E5E834F67650675E2ED21C1099027C484051C6E5E8973BEB0363A9FBE48D8B8C14A71B8
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\c7f417385ad0909471abb17da32f75e9.docx"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\55BE.tmp

    Filesize

    1.8MB

    MD5

    cf39f13f13a0e97fbe2553be5cf6a3a9

    SHA1

    9b48e9454d589998f191ffa34f6b583c8981ccc8

    SHA256

    f503bab3f3d4850313cf178cb020babf0f6599def14c3d9edd30779ffc0d0f8f

    SHA512

    4807ba1012e80cffaf00cfe29b454b9750e1cc2640f1ad3b8c0eeb4db30b94e7bf02cfe6f700a87f9b7fc706e4b41cd576c1e75e6c3c906f8fc6a1c89ddde1e1

  • C:\Users\Admin\AppData\Local\Temp\c7f417385ad0909471abb17da32f75e9.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • \Users\Admin\AppData\Local\Temp\55BE.tmp

    Filesize

    1.6MB

    MD5

    a912a19b9d78c15f0f630c5b22c68d2c

    SHA1

    af77e4121588cee05620e51a9be396ef474f1ed0

    SHA256

    d80578d2465f3f04f158b09cdadf78e7286bc50fe4a0578599af55499f61fc9e

    SHA512

    2a03f4649622125af13c9ad3242a3b9220a5d66e79eba8ceed22700fd52373b3aebab885f18c5673f6576be14e0d2791d04a0e84d711e328551bd188b5bb40e4

  • memory/2148-0-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/2584-9-0x000000002FA51000-0x000000002FA52000-memory.dmp

    Filesize

    4KB

  • memory/2584-10-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2584-11-0x0000000070C6D000-0x0000000070C78000-memory.dmp

    Filesize

    44KB

  • memory/2584-15-0x0000000070C6D000-0x0000000070C78000-memory.dmp

    Filesize

    44KB

  • memory/2620-6-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB