Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 10:11

General

  • Target

    30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe

  • Size

    1.2MB

  • MD5

    d640767781188fa608b5fec293c2bc5b

  • SHA1

    ce201e552998f24730bd105ddbebd41efcb3d08e

  • SHA256

    30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd

  • SHA512

    e42ee5d294d3f26250266dea009559b0e81575a4f96b07a7407e01837078fa2ff28b9ada5cec40eba9cf302f17ea616f2ef7c5f6239264e912e20b54e388e8bc

  • SSDEEP

    24576:hb3frTqaFfUodpJ416PRntaprEyblePXTLfTCwCuV9Z:hrTNUUJ4oP/AV4PDLfTXV9Z

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe
    "C:\Users\Admin\AppData\Local\Temp\30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Roaming\Microsoft\lib\dlshsvc.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\lib\dlshsvc.exe"
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1404

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Roaming\Microsoft\lib\dlshsvc.exe

          Filesize

          1.2MB

          MD5

          59c350390b13ffbca699ffe321fabbaa

          SHA1

          51de401ead98d3d03ed34555bb7f2bc4999e038e

          SHA256

          a3af853a73bd074542425deea7ae092ed8588cd446679bbd04f013b986ec540f

          SHA512

          cdf91c1d8dd84df22d7b362a084922c7c5f11457bb3ad8dd39f0d8873bf48d7de764da7e57daf29447bbf7a97d792bb99690540b09d196044862ecb5f0aadf7a

        • memory/1404-18-0x0000000000400000-0x000000000054B000-memory.dmp

          Filesize

          1.3MB

        • memory/2024-11-0x0000000000400000-0x000000000054B000-memory.dmp

          Filesize

          1.3MB