Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/03/2024, 02:36

General

  • Target

    d7abdf205577c961251e5ba839893da0.exe

  • Size

    13KB

  • MD5

    d7abdf205577c961251e5ba839893da0

  • SHA1

    5decf1ee6eadd16d0c5b1b60a45a8fa8cc103528

  • SHA256

    2bce9deb36bdeddf9741bd111dcff13a0ad527b56ec8a66518fc4d5da6f1c5b7

  • SHA512

    00c79f40518eb41264f02b665348fc4a29683d80c77a2178ac160bc8315557510c58cfb50e6eb472bfc034c3e81b42bf9c0f890dc90eb74342ca794d9bf773a2

  • SSDEEP

    192:9ktEZ2i9iBJQTbF2qOPcLtSGDPYv85Cw7p9SvmmF1aE3jdlpZx9Wn5aAhhS9WDQ0:etEXUJPcSUl9w1HdZxA0MhS9Wc0

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7abdf205577c961251e5ba839893da0.exe
    "C:\Users\Admin\AppData\Local\Temp\d7abdf205577c961251e5ba839893da0.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3088
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\DA62.tmp.bat
      2⤵
        PID:3344
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4788 --field-trial-handle=2232,i,9772508353233483703,11473701862007458502,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2460

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\DA62.tmp.bat

              Filesize

              179B

              MD5

              1159dcec0497b039ef3cdd4ede179e69

              SHA1

              20081aa6e97ccf7b686b3b22843b7d4619927b39

              SHA256

              e175aedf73cccaf6e45754513d7686f80a9ae0a9c7605c4dc8df9b9397fd3026

              SHA512

              a66248d23f79da9d399b43e1926e0afd69fe6936f5aa9d5b7cadc10e2db3056de832763d9d0efd9d9d0a5127f1b68ae03f5ae3c7d429c04afbc10e3687ef916b

            • C:\Windows\SysWOW64\nsyvvcfo.nls

              Filesize

              428B

              MD5

              249211d24809ab715c8ec1ceb6c97cc4

              SHA1

              e69440b857f83f74fa9a71c132dd60e9c6e583ff

              SHA256

              9288bbd417ccf3d63abd1724061f711128d64cc826cb865f59bfc2352a74bfe4

              SHA512

              ce5f716b1093741f24f6364e18bc98c893500381e802c78d513309e50abd27c26edebed7bb3da6dab412d7d53ceb9aff2f809e2e28376ffa2e02747660e64d7a

            • C:\Windows\SysWOW64\nsyvvcfo.tmp

              Filesize

              2.1MB

              MD5

              90137076490e6a07b34b5fd8c1b88779

              SHA1

              4729160fb125dc411af0b109362769525770299a

              SHA256

              dabcfd8947397d499fecf530469e68513e522b02929c76eb2d8049003a60a7b9

              SHA512

              dcd54a8eadacbfe9007ff26a79046cd3c9f0eba48577eede5c63a344986adfd21bf2b6a97069700a8c2e6e2428cd4434a33338b17b6e0b000d57a48d05e2084b

            • memory/3088-17-0x0000000010000000-0x0000000010008000-memory.dmp

              Filesize

              32KB

            • memory/3088-21-0x0000000010000000-0x0000000010008000-memory.dmp

              Filesize

              32KB