Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 01:41

General

  • Target

    7c301c4629ad927f7fd63667b4597667931579b0c458e48907eebd526e1985cb.exe

  • Size

    31KB

  • MD5

    21232e0e2e1cf1a24e86056a94f64218

  • SHA1

    218923ddc887cb34ae70d79cfeef42a64a558056

  • SHA256

    7c301c4629ad927f7fd63667b4597667931579b0c458e48907eebd526e1985cb

  • SHA512

    e8612b6d4021e6d7f64518aca7c0a049f947cce3185add0ead0d0984443d91de8f87a750d81b9f620343c0ed2504210ab0d28548fa490ad35c086faaea7a627a

  • SSDEEP

    768:cD5KLZ/vbDEj7RrWBOqMiJW6wVmuHXJHdzTC/Wc8HEzHvc:cD5SZbDEj7RaBOF6wVBpGpRTvc

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c301c4629ad927f7fd63667b4597667931579b0c458e48907eebd526e1985cb.exe
    "C:\Users\Admin\AppData\Local\Temp\7c301c4629ad927f7fd63667b4597667931579b0c458e48907eebd526e1985cb.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Users\Admin\Admin.exe
      "C:\Users\Admin\Admin.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\Admin.exe

    Filesize

    31KB

    MD5

    e08d9a666ddfd9dc33097fdeaac9a71e

    SHA1

    fc65fcadde54c6df6604ada95a380c908999ff4d

    SHA256

    edfc487acde81469dd32498403ff16858ac9bcaf0fc207104b3d96bdd94a92eb

    SHA512

    2767f61cbb8a603814e821317462625bc528283a66ec2861555056ade315ba2a5d4880f3ded74707994135af5bc8ddd6508e02a04fc05262409ceb0b9b6bb352

  • memory/2460-0-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2956-13-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB