Analysis

  • max time kernel
    149s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/04/2024, 20:08

General

  • Target

    275858824cd80e8d3e7b35204eb63dee71cbc0cc9103d130c630373bbf332917.exe

  • Size

    156KB

  • MD5

    a7789f6ab2e04587ccc913b99c863c98

  • SHA1

    b0a6c6534b10361bdbe74a63fc366d9784661e4d

  • SHA256

    275858824cd80e8d3e7b35204eb63dee71cbc0cc9103d130c630373bbf332917

  • SHA512

    fd22b26f09a37f06a2da1c9f36ee4e2a7b24821c1499b30feb87c3f775f33f5a364808340e543b96aebec28c850133e6acbb62f882242fd2bf03f8e3dbaa38b4

  • SSDEEP

    3072:7ACcTATe0pBI1xkaGU0vBpT8k/QvbawuxtUYqBd5hAmamQAMHfhRvuWxx0h4oQZa:79c4e0pBI1xkaH0vBpT8kltDr8L5DMHU

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\275858824cd80e8d3e7b35204eb63dee71cbc0cc9103d130c630373bbf332917.exe
    "C:\Users\Admin\AppData\Local\Temp\275858824cd80e8d3e7b35204eb63dee71cbc0cc9103d130c630373bbf332917.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Users\Admin\jaeuk.exe
      "C:\Users\Admin\jaeuk.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2096

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\jaeuk.exe

          Filesize

          156KB

          MD5

          da41b4966ef4c03cc6a397de933186f6

          SHA1

          7a37098198f0618ded9fcb3511d9438bed283efe

          SHA256

          c8016c7b7ab16d1114829bd3b8795dddd47add787f02eb88f8d43bf0aa794521

          SHA512

          d736d140a56bcfd19bb049a024cc461ea8c8027b23ed3b864a9ec5e8a1cf3cd05dde959d7414a3a7d31b627dce7f8b71bd95a9a46575c59782383f31a3d7cff1