Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/03/2024, 13:22

General

  • Target

    d39de5973189eb4d0c884dfaa103597a.exe

  • Size

    160KB

  • MD5

    d39de5973189eb4d0c884dfaa103597a

  • SHA1

    625766dd30fb1e2a077ca7c15b0f74de1dc5556c

  • SHA256

    7277fc173a65e84426217ea49d790b19b5b5d8a3f24be2acca4f4e6a1635858e

  • SHA512

    e99b39ad04ef89c68e7692aa9bfc2a90364b6d7f3bb2e3fa35924158256d85cab2971706220f6263fd21c668ade39a7c82043ee33d445826fb1b161067e28a1e

  • SSDEEP

    3072:Zghg8Sn4dnbla5eree+ELWqqdSTvC6HWYppiAKNWlpt7ryfrb0l3icB6Cb:Zwq4Rl+erlRLcd5626pDX3BOzIl3icVb

Score
8/10

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 8 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d39de5973189eb4d0c884dfaa103597a.exe
    "C:\Users\Admin\AppData\Local\Temp\d39de5973189eb4d0c884dfaa103597a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" create icfgnt532 type= share start= auto DisplayName= "Internet Connection Wizard" group= "Event Log" binPath= "rundll32.exe C:\Windows\system32\icfgnt532.dll,ojur"
      2⤵
      • Launches sc.exe
      PID:2612
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" description icfgnt532 "Internet Connection Wizard"
      2⤵
      • Launches sc.exe
      PID:2056
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe firewall add portopening TCP 1648 messenger
      2⤵
      • Modifies Windows Firewall
      PID:2528
    • C:\Users\Admin\AppData\Local\Temp\0b91ef20.exe
      "C:\Users\Admin\AppData\Local\Temp\0b91ef20.exe"
      2⤵
      • Executes dropped EXE
      PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\0b91ef20.exe

    Filesize

    65KB

    MD5

    ab437ad2ca17aecbccbb582a9b426975

    SHA1

    68a333a6b8746bdc8f13d3e6bae11dfeb782706b

    SHA256

    7d408f3a3197c7dc7a6ca0f6360c6102899019e2ddb222450539807b11437a6e

    SHA512

    2e7feb013ea7a6105b7fa8b2040d47d14e06197aead6cae30a965f311863fdae4e58837579a6b6d4343450d59ea51c619f2cb5ae6cf88f2b5eb0857fc64f2dd9

  • memory/2584-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2584-18-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB