Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 18:59

General

  • Target

    140ecf4ec0e47bb5ab9f2712780ce22d238386101203aafeab9a105ae61d900c.exe

  • Size

    88KB

  • MD5

    681f9b497a0197f61306fc775088f35d

  • SHA1

    7ec231726737335b18b69f3afa0518cc1905eba6

  • SHA256

    140ecf4ec0e47bb5ab9f2712780ce22d238386101203aafeab9a105ae61d900c

  • SHA512

    7efdc71eeceac5a05b509fb981e7a07777721d3d26f6c433d9939af1593eabfcd2e6632a4d24522d0f359a6c3bc4eb551268a16e1e25eecc8c835591a20a3ee2

  • SSDEEP

    768:HO6jxOJETcNnIHpFeh6RM1rA8dOsk7jbqqRkA5okK1DfsvtDzsXjLft+9o1Jz:HOcx/ANILFUnzJA5o9BfItDoXjLl0+z

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\140ecf4ec0e47bb5ab9f2712780ce22d238386101203aafeab9a105ae61d900c.exe
    "C:\Users\Admin\AppData\Local\Temp\140ecf4ec0e47bb5ab9f2712780ce22d238386101203aafeab9a105ae61d900c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\caoej.exe
      "C:\Users\Admin\caoej.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2560

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\caoej.exe

          Filesize

          88KB

          MD5

          84a65b6cbf2cc81ea0ea31a66f1dfcbd

          SHA1

          b1b9c8fef0473b54b8b9fffaf0ef21f954aec175

          SHA256

          d6ce4d46e06b1fadf3f791f41bdfbb16b3b73aea282d66e42a67037f9abfe79b

          SHA512

          333814c0b52121043b0ee959dc719067cd78b193fbc3aef01423ed87d182dcd092695b2a74decc7489a00485defaf5771d8f118cf1e9c3bd8532dda1528aa65b