Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 02:27

General

  • Target

    b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe

  • Size

    53KB

  • MD5

    713d26727f5b28b78b189f45667c78bd

  • SHA1

    92214eb7a28a865e4991264d2f14ff28ac456e87

  • SHA256

    b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8

  • SHA512

    71dd4165752360591793a125ec1daae74ff4d657a00b00dfa628ac8565ec3b6f0eab9f8481b8ee35b2af5101db656d3b8066ed35ccae72f9c69ac6375878d33d

  • SSDEEP

    1536:vN5g8r8QP4mg7Kp3StjEMjmLM3ztDJWZsXy4JzxPM0:T4mgJJjmLM3zRJWZsXy4J9

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe
    "C:\Users\Admin\AppData\Local\Temp\b141946d09e1f94e727fd5a74a48e25637be3d3eb34f7e8f210d668b811969f8.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\paiom.exe
      "C:\Users\Admin\paiom.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2136

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\paiom.exe

          Filesize

          53KB

          MD5

          ced49b0b28cefbad04a1775cda5c68b7

          SHA1

          6d3718dbe51b6796a36ba5f8e1f125206c8803f7

          SHA256

          d11685b2fe0c7eade6739a395fc661624c28fa1a3b4578336b91b88a2edaaca4

          SHA512

          101ddb2a50aa50b4ae06ece3b5dcd923f9d895bafe8c331aafd3ea9f54c828037384cdae338ef14b79083e667fe31c6352eedae9adcfc3ae8a8440d6b272a626

        • memory/2136-16-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2844-0-0x0000000000400000-0x0000000000412000-memory.dmp

          Filesize

          72KB

        • memory/2844-9-0x0000000003960000-0x0000000003972000-memory.dmp

          Filesize

          72KB

        • memory/2844-15-0x0000000003960000-0x0000000003972000-memory.dmp

          Filesize

          72KB