Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:47

General

  • Target

    834abae305adb615a5adbbc3a19eada726c2eeedd98add817a8c778a70eaccf9.exe

  • Size

    53KB

  • MD5

    9c5bbd1516351a98e03137de8975dc99

  • SHA1

    b3bb88c6170cc70822a48fc98e6eaf60eabe8ab8

  • SHA256

    834abae305adb615a5adbbc3a19eada726c2eeedd98add817a8c778a70eaccf9

  • SHA512

    48de1e255907054a0844b1f3eada81bf37fda4f33c689150204981bbf8b2e54dd85686f561c857fa7d3f73ecdfc52b1c9f71f32914966db53a01a916ae3b8075

  • SSDEEP

    1536:vNhg8r8QygAeLj/7Kp3StjEMjmLM3ztDJWZsXy4JzxPME:OgA+bJJjmLM3zRJWZsXy4JN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\834abae305adb615a5adbbc3a19eada726c2eeedd98add817a8c778a70eaccf9.exe
    "C:\Users\Admin\AppData\Local\Temp\834abae305adb615a5adbbc3a19eada726c2eeedd98add817a8c778a70eaccf9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\fvmir.exe
      "C:\Users\Admin\fvmir.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\fvmir.exe

    Filesize

    53KB

    MD5

    c0eb1e8c113f8def3b6b59218694647b

    SHA1

    3a5a46f8dede0b6d90c7bd56f4af87d71b90cf5b

    SHA256

    eedce86c546df38d22e1938238ef1af6407917c726fdccc8bdda9146ab08b442

    SHA512

    6def2a04f33b6078b74c5d8b88e99f122448ba0578b3ad7ff6b2670437ff0491f635709eb2be0f9248c5aa42e00501044cf5af6694aaeead9a28db1cdb7df7fa

  • memory/2912-16-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2972-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2972-9-0x0000000003A30000-0x0000000003A42000-memory.dmp

    Filesize

    72KB

  • memory/2972-15-0x0000000003A30000-0x0000000003A42000-memory.dmp

    Filesize

    72KB