Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-04-2024 21:33

General

  • Target

    17798772cd816a7ba82c9c2a2ca36190.exe

  • Size

    184KB

  • MD5

    17798772cd816a7ba82c9c2a2ca36190

  • SHA1

    d477153b0cbdd9e5d032f0f127c53aa320408090

  • SHA256

    27e3ea83d86b35d484e4425f6e8e46180d2a41f78cf071c564c7511ed3818145

  • SHA512

    ee30e8028a3e08c7567398e1b6d415b6a4d6d7ddea83c8cc48aa7e30ebff6883bff67ba0b490e8728257a3ef1c917541a08b8d6331d29cd333b66166105febce

  • SSDEEP

    3072:ymaRXjFcNcWavo3a9qhC+v2NNSnRjILhgQpCUR1VfpxF:mXaK23a9qhDn2LhggVR1Vx

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17798772cd816a7ba82c9c2a2ca36190.exe
    "C:\Users\Admin\AppData\Local\Temp\17798772cd816a7ba82c9c2a2ca36190.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\puenoip.exe
      "C:\Users\Admin\puenoip.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\puenoip.exe

    Filesize

    184KB

    MD5

    8d4bc1d5924f86f151f9ff7c6ed6b7db

    SHA1

    6d264e1fe994619ee9cde4e1d23f404b73698d8b

    SHA256

    5f503360155531ebecf882422c351abe44e9fce34d423f2aa64cdf607a9604fc

    SHA512

    de26584521d4390462403b743ed23e5d4de20341b1bc56c53c6b501060d30b9ee2c54d9955af2a5b0dc2a4b40c53f601dedde7de2e4a690be4ad0ca8db1c504f