Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12-06-2024 07:02

General

  • Target

    f977425dcf5425a8a70435265c75262925951991453e958b1a305005da12a181.exe

  • Size

    89KB

  • MD5

    0c186b1f7dfe3cd756de2aa40731aaa8

  • SHA1

    102ff61711cd80752f37927a6f63577c39c12d17

  • SHA256

    f977425dcf5425a8a70435265c75262925951991453e958b1a305005da12a181

  • SHA512

    c47f02285aaa8b806cdb423772c7f9fbe7af7279d154b5a89659852954f606f9dd8a033b6efead124760ad3c4e0546fe17dd727cd3caae16b8c3605ee20172a3

  • SSDEEP

    768:UZrb6K4Fd6eUCRGIIPP1y7oLacaIBLP3ner42Q:UkTFTUCxQ1aZr42Q

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f977425dcf5425a8a70435265c75262925951991453e958b1a305005da12a181.exe
    "C:\Users\Admin\AppData\Local\Temp\f977425dcf5425a8a70435265c75262925951991453e958b1a305005da12a181.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\tealuuf.exe
      "C:\Users\Admin\tealuuf.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\tealuuf.exe

    Filesize

    89KB

    MD5

    ff74cb720fdc0bfedb430e3143229058

    SHA1

    b7afc53f5f221a6548a430a0a607459aeba54707

    SHA256

    7c51c772c95a1e6625db8511a815addda5f90a67b1c1d5bfe97b339fb3cbf242

    SHA512

    ed3ebb4dbb8ec734f0806e9c2d332c655fbd7839385f2823ab5e50ff1b728df7241ca7d5c91d18751468baf4f8254dfe36c36d79a314ac04983b32cffa11d570

  • memory/1968-0-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1968-9-0x0000000002FE0000-0x0000000003010000-memory.dmp

    Filesize

    192KB

  • memory/2516-15-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB