Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 10:59

General

  • Target

    deff716a2284199464e649d3fa74bfd9.exe

  • Size

    38KB

  • MD5

    deff716a2284199464e649d3fa74bfd9

  • SHA1

    a4b20c725712eabf9f38ff6aba9a1cf262023e72

  • SHA256

    aad87ee6abdc9ede1045813afc28c0fa1d8861cf2f4c1be51e4249f14c1accba

  • SHA512

    65232dd68a8de6ec0f64aaa0f1d7bdf3708d7f7c053a7ee0d3b090388bfe344f456d3d14d866390bbe2c1ac52f41aeb29fed121e0ce64b6647a3ef0b0ecdf93a

  • SSDEEP

    768:jerqpYJgAFVaqlkeDfCzNEMrkJX77A8w9afaLJWAE1:qJn8Phz4V/fakAE1

Score
8/10

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 9 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\deff716a2284199464e649d3fa74bfd9.exe
    "C:\Users\Admin\AppData\Local\Temp\deff716a2284199464e649d3fa74bfd9.exe"
    1⤵
    • Manipulates Digital Signatures
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2772
    • C:\windows\SysWOW64\msevnt.exe
      "C:\windows\system32\msevnt.exe" -kill c:\users\admin\appdata\local\temp\deff716a2284199464e649d3fa74bfd9.exe /install
      2⤵
      • Manipulates Digital Signatures
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\windows\SysWOW64\msevnt.exe
        "C:\windows\system32\msevnt.exe" -kill c:\windows\syswow64\msevnt.exe /install /install
        3⤵
        • Manipulates Digital Signatures
        • Executes dropped EXE
        PID:2556

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Windows\SysWOW64\msevnt.exe

          Filesize

          38KB

          MD5

          deff716a2284199464e649d3fa74bfd9

          SHA1

          a4b20c725712eabf9f38ff6aba9a1cf262023e72

          SHA256

          aad87ee6abdc9ede1045813afc28c0fa1d8861cf2f4c1be51e4249f14c1accba

          SHA512

          65232dd68a8de6ec0f64aaa0f1d7bdf3708d7f7c053a7ee0d3b090388bfe344f456d3d14d866390bbe2c1ac52f41aeb29fed121e0ce64b6647a3ef0b0ecdf93a

        • memory/1532-14-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/1532-18-0x0000000000560000-0x000000000057D000-memory.dmp

          Filesize

          116KB

        • memory/1532-22-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/1532-23-0x00000000026E0000-0x00000000026FD000-memory.dmp

          Filesize

          116KB

        • memory/2772-0-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2772-1-0x0000000000220000-0x0000000000222000-memory.dmp

          Filesize

          8KB

        • memory/2772-12-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2772-6-0x00000000025A0000-0x00000000025BD000-memory.dmp

          Filesize

          116KB