Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-04-2024 23:06

General

  • Target

    722772167e5be7cdc0a3e00d59c0668de240d9ca85f7fbe966cdb14e8d361ba3.exe

  • Size

    53KB

  • MD5

    a6ed521b1ed12e31e06134270fd09135

  • SHA1

    845ecdc6d09e43148ef9fea64185a9ae113cd30f

  • SHA256

    722772167e5be7cdc0a3e00d59c0668de240d9ca85f7fbe966cdb14e8d361ba3

  • SHA512

    ec7681520cf708e2f8649edf338ac94600052553fa1e53a40f3dc1fefe3e35a7255b739956620f1bc77bd9c375e7d7203342cd279ea8b67cb318df27529d8590

  • SSDEEP

    1536:vNzg8r8QTO/at+7Kp3StjEMjmLM3ztDJWZsXy4JzxPMU:FO/aoJJjmLM3zRJWZsXy4Jd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\722772167e5be7cdc0a3e00d59c0668de240d9ca85f7fbe966cdb14e8d361ba3.exe
    "C:\Users\Admin\AppData\Local\Temp\722772167e5be7cdc0a3e00d59c0668de240d9ca85f7fbe966cdb14e8d361ba3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\pieore.exe
      "C:\Users\Admin\pieore.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\pieore.exe

    Filesize

    53KB

    MD5

    f6a10493a361122e7526bbc61e15df14

    SHA1

    4a46583c47daebd9e8417ef2f00bc3de47146140

    SHA256

    6115fbca250929fd8008d03871712e10787e7e955eeb7c41d6f726ed27512e6e

    SHA512

    1cc8b46cda165b0e0b62871dda325ea4c370851ebacb7d0c28220d0438f94cf7b63613d8bec77146a2e375951fc5e725019b222c9a150b31e43a9a91d48e6d7e

  • memory/1296-16-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2088-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2088-14-0x0000000003970000-0x0000000003982000-memory.dmp

    Filesize

    72KB

  • memory/2088-15-0x0000000003970000-0x0000000003982000-memory.dmp

    Filesize

    72KB