Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 04:38

General

  • Target

    ca818aea3dd2279856aeff636dd1232a.exe

  • Size

    2.5MB

  • MD5

    ca818aea3dd2279856aeff636dd1232a

  • SHA1

    a1a2eb56612c92eae0b46af7f01067193d40dd0b

  • SHA256

    3a8ea2fa0d4e97188e2ad8aae575c3c7a95cf16d4d4903e1fb9b73d7459abbb8

  • SHA512

    870349c7451f0668e8849039e0afa4e1b35d3657ccc32e8f3d24f87dfd525a4f54b46f4dbf3f285fdbaac806fd93c9533165d74595d549bffe84f68d92128be6

  • SSDEEP

    49152:5UUWLPMGyxBsliDJrqIB2xo6W9ELsTdxDIH0xsMjaSdU8UkqONFJbZDST2dQEZ82:5UJLP4IliV666W9ELsTdFIHojRb51nJD

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 14 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca818aea3dd2279856aeff636dd1232a.exe
    "C:\Users\Admin\AppData\Local\Temp\ca818aea3dd2279856aeff636dd1232a.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\WINDOWS\SysWOW64\a.exe
      "C:\WINDOWS\System32\a.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe
        __IRAOFF:542221 "__IRAFN:C:\WINDOWS\SysWOW64\a.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2512
        • C:\WINDOWS\SysWOW64\aaaaaa.exe
          "C:\WINDOWS\system32\aaaaaa.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\WINDOWS\SysWOW64\b.exe
            "C:\WINDOWS\System32\b.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:3064
            • C:\WINDOWS\SysWOW64\cmd.exe
              cmd /c ""C:\WINDOWS\System32\spool\drivers\w32x86\3\CMD.bat" "
              6⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:2492
              • C:\WINDOWS\System32\spool\drivers\w32x86\3\a.exe
                A.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Enumerates connected drives
                • Modifies registry class
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:1660
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
    1⤵
      PID:2468

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\WINDOWS\SysWOW64\b.exe

            Filesize

            796KB

            MD5

            321497c2424ac35d4b6ca5a904010ec4

            SHA1

            d516fd0cdc258facfa194d585eeab49417128f0a

            SHA256

            c56be98033e609dab444aeba5ec5de5140974fca56328825506fa4cb8cbf26b3

            SHA512

            3727f8644b2dad9e1d5a217baa0723f511e3e1a8a964bfadf714fdaf1234cdcac5b95b38869f61620613ff2dff911f60d6db3149915a7ba2569563d0df868779

          • C:\WINDOWS\System32\spool\drivers\w32x86\3\config\a.dll

            Filesize

            611KB

            MD5

            ae1b8f387986c780f6c5eea3175548c7

            SHA1

            d386930099553af5925cff75dd461073e872f87e

            SHA256

            a8d7f089f3e436aa68d0a308b56d8b84adb40c829df0e1737b7c710f8768fb5f

            SHA512

            216e641dbe0e31066184992dcac787d4f78e008a612b503e0620e9438a2e7f27304b43175560f3d085b3e83a269c0f5a5011a075f6340a194ffbcd790374be8c

          • C:\Windows\SysWOW64\glxpbuttonz.ocx

            Filesize

            108KB

            MD5

            455812a36b41a4ce537589ebd1410111

            SHA1

            6a7872729d72f4fe8bc979846237d25436deec11

            SHA256

            86711c5044f2659c31cc8455bae9f3f361e821bb97d45cac0c2d880d23c45026

            SHA512

            e2810e09e24564027d1e35a5c5d08b514d914b7e7a3551bc5098bd98e270207d5ab2a162d9dc42fec89809a217d1d35fa724e5668a9fdb45b897d61909df9825

          • C:\Windows\System32\spool\drivers\W32X86\3\CMD.bat

            Filesize

            2KB

            MD5

            759354cc8c22275b01e52eba0c2bcfbe

            SHA1

            f1882afc599aeea1840a9dfe30780a98f87a56f5

            SHA256

            8264db5b30727016fddc035cbb76b2c5781a8de115e21b7f1f867eae02342af5

            SHA512

            5600ba4bdee9800cfceb7e14f805cb051d6fffdd4b5651fc762fd8677855e29d8b76eead0541afdfdd3b31df3d431f0f33110de5c946dfdb2346dc920a63f7d7

          • C:\Windows\System32\spool\drivers\W32X86\3\a.exe

            Filesize

            1.2MB

            MD5

            daac0c6d9bf7b1f94c068740d676c581

            SHA1

            fe1d184b5ac0de87e474efef729e85fbc9765050

            SHA256

            3eb25577eb48f63ed97182709b395f35a318d7daaa1e3c76da34fbfe12041027

            SHA512

            8f6547f27b569ae296b32e1ed8423a85082840efc67118a9c44fbc637bdfac6154f5caa3a1af690f9118bb55c6e1ca5034946f4ed860cb899c50c38176e327dd

          • \Users\Admin\AppData\Local\Temp\_ir_sf7_temp_0\irsetup.exe

            Filesize

            461KB

            MD5

            1c58b6ee4cb9561e81095b76656a2ef9

            SHA1

            1a7a7b05f97aa0d5280e423f5712a71d26a7c724

            SHA256

            f3361c6d49a75c7a7d6a1cba252d5ca4a178ee69b7a07e1fa2ed28820f6b7cc7

            SHA512

            106cbdb37d592b4586c206981e44f928e875c7497471f55031ebf7de0aaa0ace09e7fa028fc31a34aa6822415b068a91b4f3f297c7216171d07f6a50b9eadbf1

          • \Windows\SysWOW64\a.exe

            Filesize

            1.7MB

            MD5

            9dc76117fe9b4e6ae96b8fef396356c6

            SHA1

            29632ac44921f203cf04ae02325c4d681c9008a0

            SHA256

            19bebd9a50bae84662903685f7c76e81898106d7d1ddfe91107cac7f17f50c92

            SHA512

            b2c91e0e068a39b4615c113a6e1b9b8c7872af2d6c740895e4158cdcc24101d49ae1f560a03cd90c9e4faf1d179c766fd0cca36cdd66d72e55f9bcf7c09780a0

          • \Windows\SysWOW64\aaaaaa.exe

            Filesize

            94KB

            MD5

            cea57232bd4368f8b5bff456b2c044e3

            SHA1

            fc50fc90fab392b301693e4e6adcad46f936aa46

            SHA256

            ee991ba67bca3139f2d575439ada7bd3f139c1d121f20395f7dd314757b4362b

            SHA512

            cf95a16a8caacab100694ff2c3bda0537c5b28707745adcd9e2e77c1a0e7b26b9bec8a6cb1dc0c8f33c0473774743cb40db04772574241f8c2fed2120bf80f9e

          • memory/1660-89-0x00000000002A0000-0x00000000002A1000-memory.dmp

            Filesize

            4KB

          • memory/1660-90-0x00000000005B0000-0x00000000005B1000-memory.dmp

            Filesize

            4KB

          • memory/1660-94-0x00000000065C0000-0x00000000065C1000-memory.dmp

            Filesize

            4KB

          • memory/1660-95-0x00000000065C0000-0x00000000065C1000-memory.dmp

            Filesize

            4KB

          • memory/2512-49-0x0000000000400000-0x000000000053D000-memory.dmp

            Filesize

            1.2MB

          • memory/2512-42-0x0000000000690000-0x00000000006A0000-memory.dmp

            Filesize

            64KB

          • memory/2512-16-0x0000000000400000-0x000000000053D000-memory.dmp

            Filesize

            1.2MB

          • memory/3060-14-0x0000000001D00000-0x0000000001E3D000-memory.dmp

            Filesize

            1.2MB