Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 01:16

General

  • Target

    Photo1.exe

  • Size

    37KB

  • MD5

    134beec9243886fa1ae1fe09a2e8f0f2

  • SHA1

    70c91c4ce17b56a193b2976343bb4885971a0414

  • SHA256

    17230c5866d55f7c66039d773cc43132b4f02149bdff45bd396d41f08a2c0b45

  • SHA512

    8a905e31c71720977574f7a488b61d976719580b2cb6dbdca0bc6914ccf254daac692899373fcaaddbc07dfaa997676e3cf8f5d5b81bf2c65c21d1a1e73aa398

  • SSDEEP

    768:bX3pbhvZSjPrIHHVuLIFOXds2L6cJj3AD2DLy6cgDNCK1mMZ:t3Sr0HSPXdVLDpDLy6cgDNNr

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Photo1.exe
    "C:\Users\Admin\AppData\Local\Temp\Photo1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\WINDOWS\SysWOW64\IEXPAND.EXE
      "C:\WINDOWS\SYSTEM32\IEXPAND.EXE" C:\Users\Admin\AppData\Local\Temp\Photo1.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\IEXPAND.EXE

    Filesize

    37KB

    MD5

    134beec9243886fa1ae1fe09a2e8f0f2

    SHA1

    70c91c4ce17b56a193b2976343bb4885971a0414

    SHA256

    17230c5866d55f7c66039d773cc43132b4f02149bdff45bd396d41f08a2c0b45

    SHA512

    8a905e31c71720977574f7a488b61d976719580b2cb6dbdca0bc6914ccf254daac692899373fcaaddbc07dfaa997676e3cf8f5d5b81bf2c65c21d1a1e73aa398

  • memory/2384-13-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2420-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2420-5-0x0000000000390000-0x00000000003A2000-memory.dmp

    Filesize

    72KB

  • memory/2420-12-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB