Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    20/03/2024, 02:36

General

  • Target

    d7abdf205577c961251e5ba839893da0.exe

  • Size

    13KB

  • MD5

    d7abdf205577c961251e5ba839893da0

  • SHA1

    5decf1ee6eadd16d0c5b1b60a45a8fa8cc103528

  • SHA256

    2bce9deb36bdeddf9741bd111dcff13a0ad527b56ec8a66518fc4d5da6f1c5b7

  • SHA512

    00c79f40518eb41264f02b665348fc4a29683d80c77a2178ac160bc8315557510c58cfb50e6eb472bfc034c3e81b42bf9c0f890dc90eb74342ca794d9bf773a2

  • SSDEEP

    192:9ktEZ2i9iBJQTbF2qOPcLtSGDPYv85Cw7p9SvmmF1aE3jdlpZx9Wn5aAhhS9WDQ0:etEXUJPcSUl9w1HdZxA0MhS9Wc0

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7abdf205577c961251e5ba839893da0.exe
    "C:\Users\Admin\AppData\Local\Temp\d7abdf205577c961251e5ba839893da0.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2892
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\9379.tmp.bat
      2⤵
      • Deletes itself
      PID:2312

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\9379.tmp.bat

          Filesize

          179B

          MD5

          1159dcec0497b039ef3cdd4ede179e69

          SHA1

          20081aa6e97ccf7b686b3b22843b7d4619927b39

          SHA256

          e175aedf73cccaf6e45754513d7686f80a9ae0a9c7605c4dc8df9b9397fd3026

          SHA512

          a66248d23f79da9d399b43e1926e0afd69fe6936f5aa9d5b7cadc10e2db3056de832763d9d0efd9d9d0a5127f1b68ae03f5ae3c7d429c04afbc10e3687ef916b

        • C:\Windows\SysWOW64\zsfsgzjp.nls

          Filesize

          428B

          MD5

          249211d24809ab715c8ec1ceb6c97cc4

          SHA1

          e69440b857f83f74fa9a71c132dd60e9c6e583ff

          SHA256

          9288bbd417ccf3d63abd1724061f711128d64cc826cb865f59bfc2352a74bfe4

          SHA512

          ce5f716b1093741f24f6364e18bc98c893500381e802c78d513309e50abd27c26edebed7bb3da6dab412d7d53ceb9aff2f809e2e28376ffa2e02747660e64d7a

        • \Windows\SysWOW64\zsfsgzjp.dll

          Filesize

          2.5MB

          MD5

          202c3592af92ca4a7c8e4556fdc0839f

          SHA1

          849e9f608ae655f7ddb88cc91963a91348e8e22d

          SHA256

          1637105272392ea05fc452aa020928e740ca45a30b8f7c694adfdfd1f834598d

          SHA512

          4084b80ae7e2c6f28edeffd6f6297a980b6c9551f39fecb0920a4caea4b577786954fbb7d355c1c85c94617adac405731f6669c75264a433c4536f61b947afd4

        • memory/2892-16-0x0000000010000000-0x0000000010008000-memory.dmp

          Filesize

          32KB

        • memory/2892-25-0x0000000010000000-0x0000000010008000-memory.dmp

          Filesize

          32KB