Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 05:20

General

  • Target

    f7754181967c56864c6dc02c49cac8e963097e88108a116a4deb330a43b7cfac.exe

  • Size

    172KB

  • MD5

    cca214ae774b9a98ac3e28fdb91df3ea

  • SHA1

    5ea3776425284cd021f5ee70965955ad3950342d

  • SHA256

    f7754181967c56864c6dc02c49cac8e963097e88108a116a4deb330a43b7cfac

  • SHA512

    41f71b7623325b9c1825490e8d7bbc56b874036031e18b97c4954698c5a80d32d16da1735a44cc13c45210a1626b02a323a36befbe2531b62d669905462ae236

  • SSDEEP

    3072:xCqPc8+4xLKGPQb6pLnq1AbpaMAePjT9273c0Iy8onzK98:ltxLKGPQbWqliF27MHsKq

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7754181967c56864c6dc02c49cac8e963097e88108a116a4deb330a43b7cfac.exe
    "C:\Users\Admin\AppData\Local\Temp\f7754181967c56864c6dc02c49cac8e963097e88108a116a4deb330a43b7cfac.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\wdfaow.exe
      "C:\Users\Admin\wdfaow.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wdfaow.exe

    Filesize

    172KB

    MD5

    554b28b480f3b86d36bf9c31767a7c18

    SHA1

    d053b84f3140199e05e9b822a933efd46fdafed5

    SHA256

    561a343de4569853160986d7443271cb5b9318ee4d1c7f9bdc37fe4ca3504d4a

    SHA512

    7eb04f164edf3e9de9013c45a5478fcb1710fd155a3d73c57b0740aed604ece987ad4a0b1c0f31066576f0e9821ed8f8a209891ccb88d09424cb1d0d7ed8e757

  • memory/2236-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2236-14-0x0000000003190000-0x00000000031BE000-memory.dmp

    Filesize

    184KB

  • memory/2236-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2300-16-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2300-20-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB