Analysis

  • max time kernel
    1800s
  • max time network
    1566s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 13:44

General

  • Target

    93564e681c3b63f14bfb67df98f5461917c447f343770a3a944ab251c4dac5ca.exe

  • Size

    324KB

  • MD5

    7f2e755385cce6862a68d60053d4ad64

  • SHA1

    bb7ab43a8537b4aa019f4873bbfa27fa9721c945

  • SHA256

    93564e681c3b63f14bfb67df98f5461917c447f343770a3a944ab251c4dac5ca

  • SHA512

    3e549a4527a1b4d82313436af4d2858566e2611034970fddaa21cae4e1cc22c1c3ea864751ad409d014e67ec35f0faaee08c25bb25684ba3e0d2f72da43aae28

  • SSDEEP

    6144:KWw1sSGm39FkhqL58C14Aox2hK/bbeLjbBmnZxl0FRqfcCiUUqq6YYjYzwTRoSM:Kbdb39mhC8CyTbytgiyUhUUqq6rjdRoS

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93564e681c3b63f14bfb67df98f5461917c447f343770a3a944ab251c4dac5ca.exe
    "C:\Users\Admin\AppData\Local\Temp\93564e681c3b63f14bfb67df98f5461917c447f343770a3a944ab251c4dac5ca.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\gema\gema.exe
    Filesize

    324KB

    MD5

    7f2e755385cce6862a68d60053d4ad64

    SHA1

    bb7ab43a8537b4aa019f4873bbfa27fa9721c945

    SHA256

    93564e681c3b63f14bfb67df98f5461917c447f343770a3a944ab251c4dac5ca

    SHA512

    3e549a4527a1b4d82313436af4d2858566e2611034970fddaa21cae4e1cc22c1c3ea864751ad409d014e67ec35f0faaee08c25bb25684ba3e0d2f72da43aae28

  • memory/1932-0-0x0000000000400000-0x00000000004F7000-memory.dmp
    Filesize

    988KB

  • memory/1932-1-0x0000000000220000-0x0000000000235000-memory.dmp
    Filesize

    84KB

  • memory/1932-2-0x0000000000400000-0x00000000004F7000-memory.dmp
    Filesize

    988KB

  • memory/1932-5-0x0000000000400000-0x00000000004F7000-memory.dmp
    Filesize

    988KB

  • memory/1932-6-0x0000000000400000-0x00000000004F7000-memory.dmp
    Filesize

    988KB

  • memory/1932-7-0x0000000001D60000-0x0000000001DF5000-memory.dmp
    Filesize

    596KB

  • memory/1932-9-0x0000000000400000-0x00000000004F7000-memory.dmp
    Filesize

    988KB

  • memory/1932-41-0x0000000000400000-0x00000000004F7000-memory.dmp
    Filesize

    988KB

  • memory/1932-98-0x0000000000400000-0x00000000004F7000-memory.dmp
    Filesize

    988KB

  • memory/1932-115-0x0000000001D60000-0x0000000001DF5000-memory.dmp
    Filesize

    596KB

  • memory/1932-353-0x0000000000400000-0x00000000004F7000-memory.dmp
    Filesize

    988KB