Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 11:37

General

  • Target

    $_4_/TeamViewer_.exe

  • Size

    21.1MB

  • MD5

    67a3aba3d9d1b3c06f7d29f88462f905

  • SHA1

    9cad747d67a8f87086207f443a7f1083ae922ea4

  • SHA256

    41e3451fa7dcec308581ed259849523a9f8cc5d022290c14a70f632ec55208ba

  • SHA512

    b29c1be4025aced75b6dda309b69370403ec6a16f0bd0368bd9011cc86c23db01e438fa3c7dcbe3b877478f0527c11e0b553a5cf2a4158be9ff8687110ec99bf

  • SSDEEP

    393216:OwMg1BIXOuljaia3hs5nnIzPqPvdPUkGVyXOWUSOCRhNjjgMO3tK/:OwV1xEeia3u5IzPqhNGUXOWdRhNnNkk/

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$_4_\TeamViewer_.exe
    "C:\Users\Admin\AppData\Local\Temp\$_4_\TeamViewer_.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nst1029.tmp\start_unicode.ini

    Filesize

    2KB

    MD5

    0145897af2e1f1f4acbacd34b311b7c4

    SHA1

    4a0af9c5432270fae2333d8c15c58bc33baec155

    SHA256

    864d2cb3db5ddbeee6cc7305afe0496fdcb36ce033d4248e0f774859ac505aa2

    SHA512

    84f8af3b5a92d8223891557fe442f207e43e0bcc9404e9d356847caaf48ab8f043c95d4ecee0d559eb8aaef8f3b29dfad008d1331e32a68187e29c89b47b64cd

  • C:\Users\Admin\AppData\Local\Temp\nst1029.tmp\start_unicode.ini

    Filesize

    2KB

    MD5

    2a8a139cdab38b5f4264ae82850cbd22

    SHA1

    816e8acb2adc36c7f138f963a9802622dfc9536a

    SHA256

    94bde605292510f8ae6df19083130770ae8c754906007ea93150cab63962190b

    SHA512

    d6f99e88e72cfb28afc4af0780d2ac380f00f9fe9265cbbb4b8e6390e9b6ee5870a723e1971288783fd919158659ff214bab383242fa22470d9f6f1a170e2cf1

  • \Users\Admin\AppData\Local\Temp\nst1029.tmp\InstallOptions.dll

    Filesize

    15KB

    MD5

    033ee34c40e8fa85bf2739bcb2f3e186

    SHA1

    2ca942f35f77f37df3fc6097acac34f2e77341b7

    SHA256

    c91c1796338a265b49039c0b2c7a312d764b99e5174fb2dae455ca54f8f41ec7

    SHA512

    2204e0b8721b8d85c51bd068b1695b16ee096bfc1d1cd5843f48fd04032aeee2b6a91ce82978a4b3414f3d966ec5b36fb337a4149dae3a1d0445935d964d247f

  • \Users\Admin\AppData\Local\Temp\nst1029.tmp\System.dll

    Filesize

    11KB

    MD5

    0ff2d70cfdc8095ea99ca2dabbec3cd7

    SHA1

    10c51496d37cecd0e8a503a5a9bb2329d9b38116

    SHA256

    982c5fb7ada7d8c9bc3e419d1c35da6f05bc5dd845940c179af3a33d00a36a8b

    SHA512

    cb5fc0b3194f469b833c2c9abf493fcec5251e8609881b7f5e095b9bd09ed468168e95dda0ba415a7d8d6b7f0dee735467c0ed8e52b223eb5359986891ba6e2e

  • \Users\Admin\AppData\Local\Temp\nst1029.tmp\TvGetVersion.dll

    Filesize

    210KB

    MD5

    05f51bc8ffb2c8f5a2825bf5680301cf

    SHA1

    30f7f77dce1fb3526142780e9f5bd5c11622d6b6

    SHA256

    c67cbd5e35e1ce0c7ba17c55d8e2bc33afd5e0a68774554a1fe7216d330c709e

    SHA512

    1e041aaa37dd00414ad955ebc8c0f708589014d2085a5a0b95a31f4d694bb1cc4994bb1324d4b983cbad0449fb0a05560d82c60fdbfc78be67ff61275e451233

  • \Users\Admin\AppData\Local\Temp\nst1029.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    9b0db6a6056e8e51ac35e602aeab769f

    SHA1

    b541c6d2635141cdc3a74f59d55db8df4a92e7ac

    SHA256

    925d80c31702a95d58ede91ee97fd842de78ca6dde69156a6c1a755fba93cd5c

    SHA512

    83fe9d346835940a37e0e0a18d041c9d13fc95a0e9ece3bc18e555cf0e8e7ddf7b42dba422b1e55ace31db3c9fc807e0b44e93b8f07f5acb943eaaf77b4f0ac6

  • \Users\Admin\AppData\Local\Temp\nst1029.tmp\linker.dll

    Filesize

    45KB

    MD5

    4ac3f0ab2e423515ed9c575333342054

    SHA1

    a3e4f2b2135157f964d471564044b023a64f2532

    SHA256

    f223d6c72f86544b358a6301daf60ccdd86198f32e3447a1860acf3f59f2dae9

    SHA512

    8fbd5b4989be51c27fa15af155d2921bea9aa5d0557a22d4224256e678dfe7dcaa5f80917a748c31dc9c9a91573e4618e2497ccfd47eefd7a0fa08c12366a1e5

  • memory/1392-245-0x00000000003F0000-0x00000000003FE000-memory.dmp

    Filesize

    56KB