Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 12:28

General

  • Target

    cb68a628b41c887f1d5cdac00d2d43a9.exe

  • Size

    9KB

  • MD5

    cb68a628b41c887f1d5cdac00d2d43a9

  • SHA1

    e9cc8d9432f757597bb42c3a7cb7653db10c17c3

  • SHA256

    cdab1bbe69df6b327ed1d5662e90a35f51c3830dbd21f9e3f70da1a4d2d05b93

  • SHA512

    8abd0536b3b389cad3f501a6145bfff1edf680165cc55b2fd818f6ef4928b66c24ef30763b2c4761cacb8acf741cf32e1005dd70840bf220ba0e6dd8ae4fc4c9

  • SSDEEP

    192:5uyEnhtr+2pr/ZZtdxKfV32wrUX5tjwGPz95dmGirHuqYJa3:5u/dbZZUf1oLzp5JirTei

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb68a628b41c887f1d5cdac00d2d43a9.exe
    "C:\Users\Admin\AppData\Local\Temp\cb68a628b41c887f1d5cdac00d2d43a9.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\1822.tmp.bat
      2⤵
      • Deletes itself
      PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1822.tmp.bat

    Filesize

    179B

    MD5

    cf23de1821586493735711cc013e6443

    SHA1

    01deaeb999dc2a9ddf58e8e870459de62727204e

    SHA256

    06eef7239dfa77c6b3d0afaf4dfec12832a82b3c2a00c5d9f0570e1545daecde

    SHA512

    3439633b6fcd453f3d83d700899d6aaaa9911f1ffd08a6065403bffcfe9c57012e626a306e01c96f386e9545bf5a290e739ac2aec28fb5d2fa79681974f14e29

  • C:\Windows\SysWOW64\midimapjr.tmp

    Filesize

    1.0MB

    MD5

    1869f5eeff8b571b7fd7361c3b1dcb9c

    SHA1

    2f8107abb2e1ea2bfa0c30e45a2d4748f67d12cd

    SHA256

    291b5280fcf384878331b4e1c8e2df23127afe7968ab901c918e13d66c040fa2

    SHA512

    6a5b5ef925eaeae2e8943d89e410ccf234aeb7ab2f95e99d9f05ba809460a7cc6bcf4b67a7e61cfd1a605789033d4f7a9d9aee63259aba2c19f4eb8103ce7dd5