Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 23:59

General

  • Target

    cde562b27c09719b9fd33a3dfecb52eef364037fa85c1e7767c49e4da4c07f19.exe

  • Size

    408KB

  • MD5

    05cbdbb5a8925ed51277957c2de287c0

  • SHA1

    48e565d05fe6c8cf7f5785cd2687335eb8f143e4

  • SHA256

    cde562b27c09719b9fd33a3dfecb52eef364037fa85c1e7767c49e4da4c07f19

  • SHA512

    877de4534bbf473426852b7b11467d5fc1e72a1d85e34712fc9ce9420b54e25d2e88bfc07daaefbc2e82479c9e847c750cbf1cd35306dd8ab4653e7aaf488f97

  • SSDEEP

    6144:SzY8fGmZ9oKpYdGizwhGt7k9dcKCdEkR2OAkmQxkpnUMgpmDJOGExOfKdLK/P2S9:CTZ9duukRX8WkpnUMuGExOfW+/P2SQ/+

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cde562b27c09719b9fd33a3dfecb52eef364037fa85c1e7767c49e4da4c07f19.exe
    "C:\Users\Admin\AppData\Local\Temp\cde562b27c09719b9fd33a3dfecb52eef364037fa85c1e7767c49e4da4c07f19.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\raobi.exe
      "C:\Users\Admin\raobi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\raobi.exe

    Filesize

    408KB

    MD5

    c8d468c3a3e765529976cb7843b9300b

    SHA1

    14f162a1c73075b8e52f300f835db4f86be14833

    SHA256

    445ef77fa4cbfd7809c97b73070a6e5efca47fa141d6a3b30e17b9db156c10fd

    SHA512

    7fbdeeb0010fdac9fc21d062d5a8b0196856609478cd42052e2431223652765762222cd3de8c24be6dd9bbec005dade520c64461e7b907d044a46fd2e5df3232