Analysis

  • max time kernel
    142s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 03:44

General

  • Target

    ca6630338b490e1ec5803a080aa3ed37.exe

  • Size

    158KB

  • MD5

    ca6630338b490e1ec5803a080aa3ed37

  • SHA1

    84af70d6b02cd39a152712bdd287ee6b551b36ca

  • SHA256

    9abe52617f5243dd82f106deb57d890f2ed77a63be6de4e67c354d74941c2f0d

  • SHA512

    43399342426a712a8218eca63cba1ca6000b5a73891fe91fd70cbee40e15f482b02907e4b9356912b549d1f2fa467d5fac6ebe4f02db4b20f2d9f7f75fd7759d

  • SSDEEP

    3072:KqQ+glQWLIjZ/3HCd8tvUuEeMYCKNklApHDq109Ma4cKeurjjf7b:/PYIOnh9KNklIA8grf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 34 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca6630338b490e1ec5803a080aa3ed37.exe
    "C:\Users\Admin\AppData\Local\Temp\ca6630338b490e1ec5803a080aa3ed37.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Program Files (x86)\svchost.exe
      "C:\Program Files (x86)\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1580

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Program Files (x86)\svchost.exe

          Filesize

          159KB

          MD5

          fb85c903b2b2f94a873e9991ed5a46ea

          SHA1

          4b019dd0f6a3c2092d6515dcbbd31a0718998ff6

          SHA256

          e19993c9583bc548d936e1d33fac34e5ba975161b601d74af06cabdbf79bc134

          SHA512

          ea4dc05f99f9e822834818f9f15d8756225cf91308e3786cbd5b2ece7acaa0792a1e1df9b147ea4346ae7f5429776f578ab9e241508dd32f803c05d01e59b86f

        • memory/1580-11-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1580-12-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1580-22-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/1580-23-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB

        • memory/2516-10-0x0000000000400000-0x000000000042E000-memory.dmp

          Filesize

          184KB