Analysis

  • max time kernel
    126s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 01:32

General

  • Target

    a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe

  • Size

    5.7MB

  • MD5

    499b681e0d100aa7f93837304ed71689

  • SHA1

    c8ac53450658a271fd2e8afd93199f0d8f6b34e9

  • SHA256

    a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff

  • SHA512

    79f8b4e3d7a88c33daa81c1b5cebf6e9703f1723eec1b331b747d6d21633ba9dc93cd709905442ab6c479d84b1d7b838a324c474984aed147a95f41a7f64be91

  • SSDEEP

    98304:g2mDMmD2mDc2mDMmD2mDe2mDMmD2mDc2mDMmD2mDe2mDMmD2mDc2mDMmD2mDp:g2mDMmD2mDc2mDMmD2mDe2mDMmD2mDc3

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
  • Adds policy Run key to start application 2 TTPs 6 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe
    "C:\Users\Admin\AppData\Local\Temp\a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\SysWOW64\REG.exe
      REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
      2⤵
      • Modifies registry key
      PID:3040
    • C:\Users\Admin\AppData\Local\Temp\avscan.exe
      C:\Users\Admin\AppData\Local\Temp\avscan.exe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Users\Admin\AppData\Local\Temp\avscan.exe
        C:\Users\Admin\AppData\Local\Temp\avscan.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2508
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c c:\windows\W_X_C.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2712
        • C:\windows\hosts.exe
          C:\windows\hosts.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2412
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
          4⤵
          • Adds policy Run key to start application
          PID:792
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:844
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:268
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:1308
      • C:\Windows\SysWOW64\REG.exe
        REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
        3⤵
        • Modifies registry key
        PID:2004
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\windows\W_X_C.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\windows\hosts.exe
        C:\windows\hosts.exe
        3⤵
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2472
        • C:\Users\Admin\AppData\Local\Temp\avscan.exe
          C:\Users\Admin\AppData\Local\Temp\avscan.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1364
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c c:\windows\W_X_C.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2664
          • C:\windows\hosts.exe
            C:\windows\hosts.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2692
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
            5⤵
            • Adds policy Run key to start application
            PID:1652
        • C:\Windows\SysWOW64\REG.exe
          REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
          4⤵
          • Modifies registry key
          PID:2236
        • C:\Windows\SysWOW64\REG.exe
          REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
          4⤵
          • Modifies registry key
          PID:1188
        • C:\Windows\SysWOW64\REG.exe
          REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
          4⤵
          • Modifies registry key
          PID:1712
        • C:\Windows\SysWOW64\REG.exe
          REG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f
          4⤵
          • Modifies registry key
          PID:1816
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"
        3⤵
        • Adds policy Run key to start application
        PID:772

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

          Filesize

          11.5MB

          MD5

          8358e4f6829ce7495b5a72d92b245866

          SHA1

          a63c1194ea3d2da7720b7e3c45f4d2de55aea645

          SHA256

          fff4ca99fef930b26873ccd40f16090f5f0369b892aa5ef9adb0b59e2d163056

          SHA512

          b4a8d8417e3d8c2545f03fb86129367d786860520bf9d295044cd5efd870b32f8778a632e6ace65fdf2578df02d52b4e60c56246cd3fa709d8beae2e6bd0b25f

        • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

          Filesize

          23.0MB

          MD5

          039608e5b56fd7093dfc8a138938b014

          SHA1

          7d2fa66fcc7c3a55c885c16f11c33d7c23c00a74

          SHA256

          1ac1266838ffea4c3e6b639eeb23016c7b91f37969431a63667552e3fcb5ffd4

          SHA512

          001c38719e84f93721004ef842af82259355afd1c25beff0cabdf4be5475048e729af341016b2179c27b8d8bfd9b7c3e98671e9a6b3e62a2f6956cdd08730fb2

        • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

          Filesize

          23.0MB

          MD5

          f700ca144cc049614b44c183a5199368

          SHA1

          73849681c2351950ed34a5089c5545e23b4ea416

          SHA256

          1b2e75f32b250a6547f51491e8944105b25225d40747c9d4f13d19ea9bc182c4

          SHA512

          8e7687b59fe20b9c7bda815516dbe69eb01ac977d0b268946b513e40f2c632dc945621e846c9ca37ec99713241296e4daa347f4d37a2bee2fcdcccab87f53b03

        • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

          Filesize

          34.5MB

          MD5

          a3f0c8e29347dc87d5872deacbdace37

          SHA1

          8086483213ff640f2e13d138fb296742bfca7e5e

          SHA256

          b63d6a4fce9bf0a935b42513e29ea8db986aa0fddfd22994c919ba7318f8fd4d

          SHA512

          036d02f58c6431835c7f523ee95fdef68f5efcccbab129ceaed84d2549263b872f0c24625bc59de7dfe9d44367cfd2c7c5c671de16f445511491a26e63bc9a2e

        • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

          Filesize

          34.5MB

          MD5

          48a8bcfdd2d9c4f7ca8a1c66b75bcd8f

          SHA1

          e42a24adb6c8ecd0af8b32fcf646daf5fe9340d1

          SHA256

          f71a3d021812dd993ac4683f348484af69d04dd7cde8aabcebc8f1f1551f7eb6

          SHA512

          66b725981ee30ae4857794e0149a02ecf1a3ecc4438dab3307856b899c3b47f3424e6cbe9463991e56b253b94cb4a5693caf458e24f057fdc81d2e95d0eff7bf

        • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

          Filesize

          45.9MB

          MD5

          3304c1b9fdcb86f659c51756fc5f1a9f

          SHA1

          50bee5c14393c38869bfc7d63ff22e404c5428db

          SHA256

          416e5ff25bd95f8dd82527dc1b7540986ca8e789a6f626d00624ebc6b9d7b4f1

          SHA512

          2d3c32d5acd0efc24465e83450f3a01c04c7c40ca9438a719e700c63c79f38f2516f853118d7e47f12c3459ada204c648fc4f47d524f21772bb252d656cdfb40

        • C:\Users\Admin\AppData\Local\Temp\Admin.bmp

          Filesize

          45.9MB

          MD5

          ad8052b246ab89962c13ede723db9c9d

          SHA1

          1119407fbf71705b7136f16979a132434110a3ec

          SHA256

          d1f51ae19bdf39bd3fa9b3d162bf6cdc7b498bfc4f68dcd9e048a0a8f7ac0559

          SHA512

          71e07e0f533fbaf15da0637b6460a39c0731a671769149f343034bc59163ed5073c157f44c254141c074f8df683277efd4b36e71b35f1f97b37c24dee7b20c92

        • C:\Windows\W_X_C.vbs

          Filesize

          195B

          MD5

          a849230bdadf5127f9d776ca57d9ed5b

          SHA1

          011bc75f6eded49cabdd2ee53d7399eb897489cd

          SHA256

          9704b32703ce155ed5057f0c08f1bb4b03b7bc61ed4c55c41d9fea09ccaa6742

          SHA512

          7604ebf83392f4d241d730f7ced8e7ad874e5db1de639b0a18ee5c33523a645b1202fff9c78fc99d49a4a17f63686cda82884a19bec05e97769c6060da5be3ca

        • C:\Windows\hosts.exe

          Filesize

          5.7MB

          MD5

          86c1a18990e24d395d12771949c1921e

          SHA1

          8d8409d13b1e6616c21dfb4c53cd63c2ed05b55c

          SHA256

          e4ef6c0c6d183dff750056e3974126277d503b064e28e02b67d6e75567fe779c

          SHA512

          4b7067d2e48a3bae5f7eb1982467efdafe086b9d378476e092c2d2cbda624b35a1c568e4b4dc6807c76b682fd5f4446d9bd038a45874c2d5c44bab56314274a4

        • \??\c:\windows\W_X_C.bat

          Filesize

          336B

          MD5

          4db9f8b6175722b62ececeeeba1ce307

          SHA1

          3b3ba8414706e72a6fa19e884a97b87609e11e47

          SHA256

          d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78

          SHA512

          1d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b

        • \Users\Admin\AppData\Local\Temp\avscan.exe

          Filesize

          5.7MB

          MD5

          4e0fefb1f255c265695f8b60d1e4604e

          SHA1

          c184677bff61e358dc040f4d60a4c1d5cafdbafd

          SHA256

          0ecb48ec632900f1807b832be428c5b66b436c062c5c9b972dec8e7f29b0d561

          SHA512

          fa3f0da899480aaa3c654448fb5b6b24cc90a2f5dde8bd38577fd1fb1a48f7dc08bb40d2c9affecfeb4cf93cb153c8893332f82c97f8289e6e98cfe13999c64a

        • memory/1364-63-0x0000000000220000-0x0000000000230000-memory.dmp

          Filesize

          64KB

        • memory/1364-62-0x0000000000220000-0x0000000000230000-memory.dmp

          Filesize

          64KB