Analysis

  • max time kernel
    127s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 15:30

General

  • Target

    d6779688f011f62b752a32786d1fce96.exe

  • Size

    347KB

  • MD5

    d6779688f011f62b752a32786d1fce96

  • SHA1

    3d1042eb8e33d917ab36647c3b88c9445486ca38

  • SHA256

    7262d129f16e24f65e6139a28d2c04f64fb9864b0f9421a7466da8abc3318207

  • SHA512

    4acf297ada6d06285ea0ced1ecead988baa7b24f343be93f47b716dcff1e89a7b0da428e772f83e3a0a302ed1177ed368e148c96a7120881df35074653c5fd44

  • SSDEEP

    6144:We34OcZSGpcgmKxjbT6WsuvOlCStqbI01RW7iTaIoUZzSdeMlBpx6JTv:3cAuJH6DCMqsCRWPI3HMWJT

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6779688f011f62b752a32786d1fce96.exe
    "C:\Users\Admin\AppData\Local\Temp\d6779688f011f62b752a32786d1fce96.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Program Files (x86)\PrivacyPlus\PrivacyPlusC.exe
      "C:\Program Files (x86)\PrivacyPlus\PrivacyPlusC.exe" INSTALL
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2608

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Program Files (x86)\PrivacyPlus\PrivacyPlusC.exe

          Filesize

          717KB

          MD5

          7dc203b3bb1650b9e687a7bfc35200a4

          SHA1

          c3424912ced4e706109cb37dfd6fcfac112a35c1

          SHA256

          7e4e5ca8bc68ef6fbbf2b6bb032c332e28937a9f8fd7e5a18314da8f2cbc9e40

          SHA512

          545a422c79fceffc400e7f8a6cee9edaac86d77ce02c0ff8752ed1b29a4393f5ccf903df03466f90ef440781b253373689f0dd4a31b1a5b781d42096ea991cf9

        • \Users\Admin\AppData\Local\Temp\nsoADB.tmp\KillProcDLL.dll

          Filesize

          44KB

          MD5

          3599d30554ad65dc29fc689217d2152e

          SHA1

          8f5fcc313b667a1de2d56573bcf98d43fd0d4ff9

          SHA256

          1af3ac7d3176af42e8594ba0c33821d3318f4eea5cbb799bf8fab58e480efe0e

          SHA512

          846776b1d908b5204667715ffdfd3a6c76dface1677e8b1e5156ceac2ef0a739f68b48ccbb919c9e08d6ff359a93174bf0b90def7d48cee54cd3c41d8d8575f2

        • \Users\Admin\AppData\Local\Temp\nsoADB.tmp\System.dll

          Filesize

          11KB

          MD5

          00a0194c20ee912257df53bfe258ee4a

          SHA1

          d7b4e319bc5119024690dc8230b9cc919b1b86b2

          SHA256

          dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

          SHA512

          3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

        • memory/2272-9-0x0000000001E40000-0x0000000001E4C000-memory.dmp

          Filesize

          48KB