Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    15/06/2024, 07:23

General

  • Target

    Twister IceFun/Autorun.exe

  • Size

    4.0MB

  • MD5

    763a177e47b5dd1fcd2ea110ce104514

  • SHA1

    42e9681ea0b6d8a65d6176cd7f850517e2567c49

  • SHA256

    e4395ede12cbc68d08c722493a7275c2ba994a86787a764054b89ba47eac728d

  • SHA512

    c9ec9d041f8a0496e6b88c48c11f05d5c16727a1efaba693ad1a0d2db8b020a24f7e44b775e1310fe2b8d70ac7735688a7732b355a502e30aba77c7640b06b25

  • SSDEEP

    98304:a8M1LcgGt1nju99W66siH8wBjABdKGqEOddOhX:+Lct3q9kuiH8wdALVSOhX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Twister IceFun\Autorun.exe
    "C:\Users\Admin\AppData\Local\Temp\Twister IceFun\Autorun.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\plosinovka.exe
      "C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\plosinovka.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      PID:2292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Jgl_Rt\game.dat

    Filesize

    5KB

    MD5

    df44f860f73d4d81d43f0eccd0f7b612

    SHA1

    a26a7dae031f8d4b6df03bd5dd09eb1bc649e424

    SHA256

    938f01e92dc977b413b667ad791feca11f1b848c6b28454cf6625329598e8c36

    SHA512

    c044b3a5f443e9c31c5d20f39af6e61057c5ed0873ce17de5e7afc2df73025ccaf1a225624bd47344fb0c1ce51b03f22559976b66906973273ab976a48e71ba4

  • \Users\Admin\AppData\Local\Temp\Jgl_Rt\jesterrun0.dll

    Filesize

    22KB

    MD5

    be39c7eaed7b06d0851bc2f4102d300c

    SHA1

    daf382abef3caa24e04f4a26c0d3d67e86cdded7

    SHA256

    8a4ee45ea2338423f762ac14e1d21bccb50e4ea706fac572a9186c84a91550f6

    SHA512

    99530ff3332afa9f53e444c7458e4432d2c66767cd93327a3f03b9a12682dc599809eef145673c320bf33ae110c0a156b3c553957a07a324bd92d342866b359b

  • \Users\Admin\AppData\Local\Temp\Jgl_Rt\plosinovka.exe

    Filesize

    4.5MB

    MD5

    d35ce5a475a42ce96b233b3328f62fe6

    SHA1

    f2424b75ea8d00e1ab77c6a9716f0588a3ad6552

    SHA256

    00db0a7e63dc83ff235550aca8b6949470ca1b6899d79047d2ccaf83883fa423

    SHA512

    fbefa9596f4552afca79fe97ff56753820ce53d329e76cd501bb41c5cabeec73dcdbee1c6258103594e6a4fae97603621ca30637fe596d6877d7d6799a160cef

  • memory/2196-24-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2196-25-0x0000000000240000-0x0000000000251000-memory.dmp

    Filesize

    68KB

  • memory/2292-26-0x00000000006D0000-0x00000000006E1000-memory.dmp

    Filesize

    68KB