Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 03:33

General

  • Target

    d82922135a671af6a69455ca22bae5a9da66e03f86aae14595a6824e3aa20213.exe

  • Size

    426KB

  • MD5

    a1b78be46fc7c6f022ae78c81393d401

  • SHA1

    349a453f73b70da9138197f2bf029613f2bf47d3

  • SHA256

    d82922135a671af6a69455ca22bae5a9da66e03f86aae14595a6824e3aa20213

  • SHA512

    7041ec4786212417b082f634ca785400a28a22165896078727567340d5dd0edcccfa54172e8d4dc2e39a5e95f5dda49d28c6ed76999c0c33348af697384c7330

  • SSDEEP

    12288:BgwD2w6IRnN6SJWGiT1IpRrfW3WOvduhmxcLX/M9Uu+B7cbN:J2V1ymxcEUuj

Score
9/10

Malware Config

Signatures

  • Detects executables (downlaoders) containing URLs to raw contents of a paste 3 IoCs
  • Detects executables referencing many IR and analysis tools 3 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d82922135a671af6a69455ca22bae5a9da66e03f86aae14595a6824e3aa20213.exe
    "C:\Users\Admin\AppData\Local\Temp\d82922135a671af6a69455ca22bae5a9da66e03f86aae14595a6824e3aa20213.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\d82922135a671af6a69455ca22bae5a9da66e03f86aae14595a6824e3aa20213.exe
      C:\Users\Admin\AppData\Local\Temp\d82922135a671af6a69455ca22bae5a9da66e03f86aae14595a6824e3aa20213.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • System policy modification
      PID:1696
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:2792
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\d82922135a671af6a69455ca22bae5a9da66e03f86aae14595a6824e3aa20213.exe

      Filesize

      426KB

      MD5

      b13c62bcf44c4fb904b4206b50709a49

      SHA1

      2c2383cadf724e44ea0e25b1aacb8c4f4d861dfa

      SHA256

      794f104ad42cae754e66360a57bbdc1201d5ea5ec166c4382625576c84cd41de

      SHA512

      e9b12bb077e2d3c40af1bf14ffeba32a01dce6069e603e6a1f00b1df884b8cca2d42005c8804f47d0e4773f437f1cf6496f104f50ba440d074b22c271721dd1a

    • memory/1696-10-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/1696-12-0x0000000000120000-0x0000000000192000-memory.dmp

      Filesize

      456KB

    • memory/1696-11-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/1696-18-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1696-19-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/1696-28-0x0000000000400000-0x000000000045A000-memory.dmp

      Filesize

      360KB

    • memory/1736-1-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/1736-9-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/2668-32-0x0000000002950000-0x0000000002960000-memory.dmp

      Filesize

      64KB