Analysis

  • max time kernel
    148s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-04-2024 23:46

General

  • Target

    de52f3a1a34868d16614b49da1275a559514e5dc10150f145991ade1ce544634.exe

  • Size

    76KB

  • MD5

    34e05a048fbce8fa1a99022ba8e56785

  • SHA1

    eb971a48ff415aac3f7f480d03e245f4a10ae60b

  • SHA256

    de52f3a1a34868d16614b49da1275a559514e5dc10150f145991ade1ce544634

  • SHA512

    e68bd63234b2c07c0117e0cdb2ca61a42325bc1ad0711d608f8f4a57cbe0fa5b59433d89aebf6d50ecdfadd0a7e330be10a93e296694b95fef1d8f70ab8344ac

  • SSDEEP

    768:QM34MSL0OXIxDMyDRjFVZrhgFwumSCbxTGy/BBGg4NK8jhh/vn2+mRcDkUCXVBnz:74M1OX8MUu3abBGy3G8srcfJ

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 62 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de52f3a1a34868d16614b49da1275a559514e5dc10150f145991ade1ce544634.exe
    "C:\Users\Admin\AppData\Local\Temp\de52f3a1a34868d16614b49da1275a559514e5dc10150f145991ade1ce544634.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2148
    • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\ndsv.exe
      "c:\Documents and Settings\Admin\Application Data\Microsoft\ndsv.exe" de52f3a1a34868d16614b49da1275a559514e5dc10150f145991ade1ce544634
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\windows\SysWOW64\Windows 3D.scr

    Filesize

    76KB

    MD5

    64f3418dd996457e3fe45dabbee5e815

    SHA1

    e7e6b60f6661fd889081e0318bf04682adf66f37

    SHA256

    b19b24b4720226f83ee9197754342a436ff1911eae7bf4ed3e042cf2933e60c4

    SHA512

    959bc9e4a9ab10fc14d5f14e2e78b003d251658bcfb391b91606193442fb69ff5f8a59fc8b793655b1b887835b1e6863e7a219d89ee16f1dbbb9955c7b833a29

  • \??\c:\windows\SysWOW64\maxtrox.txt

    Filesize

    8B

    MD5

    24865ca220aa1936cbac0a57685217c5

    SHA1

    37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

    SHA256

    841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

    SHA512

    c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

  • \Users\Admin\AppData\Roaming\Microsoft\ndsv.exe

    Filesize

    76KB

    MD5

    def13db7efa4cf74ab82651a267c18e1

    SHA1

    330102b2114e181d58f0a9802d35b73ca2b18506

    SHA256

    b766c04172cb81c90bb52d02d5223189469c1b235dbbbda03eb257becfbaa0e4

    SHA512

    fa4d65cc27145f8a7333241fac89e29667a50f7503fc4057297c34d9300bf4446b93b03756af2c248fda2f3525a14ed9670d91841c911adfae68a3e73b7ddf0f