Analysis

  • max time kernel
    243s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 01:18

General

  • Target

    executerx.exe

  • Size

    184KB

  • MD5

    f34a847e097123db535071705dcacb76

  • SHA1

    1e88795a804cebc713995ceee39bbecfa3510acc

  • SHA256

    057ccff3d5c3815f97277b8821686aecdd25f3c2fd420c9ad4d7ab84f6717499

  • SHA512

    603d24c61100ae96f6a41563bc495b5221478df1b44f871a11dfb6ef8caed2591785db3051a8c399b75654d3c9cd6e4376454d2e65c9fe22a569d2c4eac7ae0e

  • SSDEEP

    3072:/MobR7ezAjLOZvmX1y5GWp1icKAArDZz4N9GhbkrNEk47GGCB:0eR7eammup0yN90QEQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\executerx.exe
    "C:\Users\Admin\AppData\Local\Temp\executerx.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c executer.bat
      2⤵
        PID:5044
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2704
      • C:\Users\Admin\AppData\Local\Temp\executerx.exe
        "C:\Users\Admin\AppData\Local\Temp\executerx.exe"
        1⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3508
        • C:\Windows\SYSTEM32\cmd.exe
          cmd /c executer.bat
          2⤵
            PID:4864
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\executer.bat" "
          1⤵
            PID:1632
          • C:\Windows\System32\iexpress.exe
            "C:\Windows\System32\iexpress.exe"
            1⤵
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3048
            • C:\Windows\System32\makecab.exe
              C:\Windows\System32\makecab.exe /f "C:\Users\Admin\Documents\~exe.DDF"
              2⤵
                PID:4184
            • C:\Users\Admin\Documents\exe.EXE
              "C:\Users\Admin\Documents\exe.EXE"
              1⤵
              • Executes dropped EXE
              • Adds Run key to start application
              PID:2368

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\executer.bat

              Filesize

              52B

              MD5

              d4ca0691c8fe9b123d9e2cc63e06d834

              SHA1

              de001ec550d1f763382cfdac910bcd696ddac07c

              SHA256

              2e1a20d4767f3b5b86d450c423175cf450c69fb4b7010199bb5aa777998d571c

              SHA512

              6c17f154251b0da59a0061b32aa17a9d3beaec890620deed230fea36448e5b83d09d9d672f7d6847c42ef357a88621a762269044ddfb42ad5524fb9ac29555cc

            • C:\Users\Admin\Documents\exe.EXE

              Filesize

              215KB

              MD5

              495135aa63666f0c5bc791875dece6e3

              SHA1

              8bf47eec91c403b791991c5e20345979f46c14b2

              SHA256

              e067a3979dce00452d0f462e6e724927acd3087dab78a9e855458d5a01c02d6c

              SHA512

              66d186f9a42aaed995a17f7c59fb4e0b0db17946efa3b446a95339981592be730bed2f7be7e0f1c725eef6e7e1873ecea4869f933a78040933be4ae7dc0bf7dc

            • C:\Users\Admin\Documents\~exe.CAB

              Filesize

              153B

              MD5

              fb44f02e70f7c8e2521b6216de414467

              SHA1

              87d4352d7667c226b7445ea0146301a55513385a

              SHA256

              808b6abbcd0705abbfb0853a57f017e65baa6c373ca9a09cd81db170e609a180

              SHA512

              2c84bf0f91653bd04f2008143e9318d2dc379023a0022e2570d859e55a9716515c8e81d2676084140b0e035085d98900bb8bd639601c54a3a578710092c8c8fc

            • C:\Users\Admin\Documents\~exe.DDF

              Filesize

              800B

              MD5

              42092c1d4d2eda3520746daca20ddfe3

              SHA1

              6e00d361f43cdadd94d0d3df735f6037397ed05d

              SHA256

              5f82264147be19ad26495b2e0cdc24940b24e31a1262c576db26f21726bc44b6

              SHA512

              7e849938aaa621b3cf868edca5f667f52abfa959a0e3eb082c203040a8ae748e322a1fc758283f31230674c22c4f9093987950af96cbaa727b14098ec6b4dc9d

            • C:\Users\Admin\Documents\~exe.RPT

              Filesize

              283B

              MD5

              84ad90460a8347fd5116c0e69a330aa6

              SHA1

              5f53d7942f6490d5f6816b94a50c87ab6dba3014

              SHA256

              ce68e2dc6ca203fd1378fb90ef6baf57409396acc690a6654ce8ca1cde9cc348

              SHA512

              9b1d43ebafad721a128bb26d9bb8676e48c552d4ae95fff0448c4198dd0422e7243d3d63a932e54538fdb35ef93ed2adaaba5a04d0bf3632e918f080541e3be0

            • C:\Users\Admin\Documents\~exe_LAYOUT.INF

              Filesize

              975B

              MD5

              d5c8398b7f0640c62772ccf07275e7f3

              SHA1

              d54c5d4cc82aa1df50429d463dcbe14d577ec192

              SHA256

              2c4a4e4509173f9b935c2bdd60062ce65ad7c17ab31eacc6d312224e2f1f0490

              SHA512

              11c6f5c7eaa0634dd1ce023bb40b0bfbde2aae8295e1bf26ec585188c90b243822c9792ee98aba02a6b6acc41cc5ba9c806c41e9306f7832e2ac9c5d446208fa