Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2024 05:24

General

  • Target

    f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe

  • Size

    212KB

  • MD5

    0d4a45dce9816e44827346c0274dac14

  • SHA1

    4887801c2741a6905e75fc1acf4282441546378f

  • SHA256

    f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c

  • SHA512

    53c6c7ab56813ff36dd4995a458a7658ace56d19786bec5ac636aaa04296096c579f841cde48568e0105970f7e08707e6577fafb1f551e3309e45c92460273dd

  • SSDEEP

    6144:3srM8O2JG4GpRKnvmb7/D26h/xFb8RQF9jwC/tRvPXbyheAg4ZIjJCe5SG:8rM8OUPURKnvmb7/D26xb8RQF9jwC/Tz

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe
    "C:\Users\Admin\AppData\Local\Temp\f905cf7e130ececea4c6256f3b816dcdfcd7cd165d1cbf89d3038d256e80909c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Users\Admin\wiujew.exe
      "C:\Users\Admin\wiujew.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\wiujew.exe
    Filesize

    212KB

    MD5

    f3415bc3119f8c09a814430339e44ecc

    SHA1

    4c47ecc43c2a07a831b4781f13b3abcb722a26c3

    SHA256

    0dbd60415255ac67099271a72cecc5886b50521d7bc18a75f835a106779d5280

    SHA512

    9b80dd8649b8209e5f2235c47e8c8078c87249819cfe53ca38eb60685b86691a4bc081f923aaca2ec28dfa4ae9325f56461fc2965edbe1a264ce44cfe2fa5b7a