Analysis

  • max time kernel
    142s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 15:04

General

  • Target

    fr.exe

  • Size

    335KB

  • MD5

    642c6b02eaaeb1d68a822c14af3f6bab

  • SHA1

    1f2eefedb9ad59d046725b20246d10e7462f9813

  • SHA256

    b973e7f93d2181b7435107ae5b548c091f79a1cda264899f5d500e44df5489a5

  • SHA512

    0dc14379ef493020286ae40d906b3f2c905e3a99113b530451b12209a6357c178a89598ae0535cfdc6b3f17ae15daa2a791dea76acb9685661b170740a0ca1f1

  • SSDEEP

    6144:Ig6O9ZgZcxDjl1+hcBkGLkdw8KYNqyIWdXqjphplvMmyejD9woDx2ntO12Q:IIZgWVChc2G0wzsq9gX2PUXe/9vDxKtY

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fr.exe
    "C:\Users\Admin\AppData\Local\Temp\fr.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      PID:2148

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe

          Filesize

          335KB

          MD5

          642c6b02eaaeb1d68a822c14af3f6bab

          SHA1

          1f2eefedb9ad59d046725b20246d10e7462f9813

          SHA256

          b973e7f93d2181b7435107ae5b548c091f79a1cda264899f5d500e44df5489a5

          SHA512

          0dc14379ef493020286ae40d906b3f2c905e3a99113b530451b12209a6357c178a89598ae0535cfdc6b3f17ae15daa2a791dea76acb9685661b170740a0ca1f1

        • memory/2148-19-0x00000000009A0000-0x0000000000AA0000-memory.dmp

          Filesize

          1024KB

        • memory/2148-20-0x0000000000400000-0x000000000090A000-memory.dmp

          Filesize

          5.0MB

        • memory/2148-23-0x00000000009A0000-0x0000000000AA0000-memory.dmp

          Filesize

          1024KB

        • memory/2868-1-0x0000000000250000-0x0000000000350000-memory.dmp

          Filesize

          1024KB

        • memory/2868-2-0x00000000003C0000-0x00000000003E6000-memory.dmp

          Filesize

          152KB

        • memory/2868-4-0x0000000000400000-0x000000000090A000-memory.dmp

          Filesize

          5.0MB

        • memory/2868-16-0x0000000000400000-0x000000000090A000-memory.dmp

          Filesize

          5.0MB

        • memory/2868-17-0x00000000003C0000-0x00000000003E6000-memory.dmp

          Filesize

          152KB