Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    09-04-2024 20:32

General

  • Target

    5abc465731bec2dee0abfbd78317b923af474de49936643d4921dbb01042950f.exe

  • Size

    140KB

  • MD5

    3b4005a9f52be94b6b7fbd9a31a2b8b7

  • SHA1

    0a698ee6f7953931c2b82c59c62fe7b73ca3a015

  • SHA256

    5abc465731bec2dee0abfbd78317b923af474de49936643d4921dbb01042950f

  • SHA512

    8d84ddc2859f5e3e8b73d54541211c2db2f238ddee7194938b0d39c991fd8ae6d624243483756914094b757e14ccc55a2eacd3fe2c7d53c63bc7200f2e1dad92

  • SSDEEP

    3072:qlfyfGL02W2N0fAU9x5Ea3hg6E5j4oQ2J:A2GL012efAU9x5BxIdp

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5abc465731bec2dee0abfbd78317b923af474de49936643d4921dbb01042950f.exe
    "C:\Users\Admin\AppData\Local\Temp\5abc465731bec2dee0abfbd78317b923af474de49936643d4921dbb01042950f.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\ceoto.exe
      "C:\Users\Admin\ceoto.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\ceoto.exe

    Filesize

    140KB

    MD5

    d8df11e5fe251222e1c6455780f44c17

    SHA1

    5085c04e06993e3ba5d9c37edd2c38cb714dce5e

    SHA256

    5e424e7a5fdfbf7a0c66edbdd358e9522405f8a8d822ae3d9b0e15a9b77ed3d3

    SHA512

    231bbfd0f3e05c43ee6be97e8a79a7da9d10febabe386a8d6b419a055584d4bb7a5ceb65fec7b539e1f8d1cd9b90773389c0919f94b97fc90bae118c271a0055

  • memory/1240-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1240-14-0x00000000030C0000-0x00000000030EA000-memory.dmp

    Filesize

    168KB

  • memory/1240-9-0x00000000030C0000-0x00000000030EA000-memory.dmp

    Filesize

    168KB

  • memory/1240-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1240-20-0x00000000030C0000-0x00000000030EA000-memory.dmp

    Filesize

    168KB

  • memory/1240-21-0x00000000030C0000-0x00000000030EA000-memory.dmp

    Filesize

    168KB

  • memory/1336-22-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB