Analysis

  • max time kernel
    142s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 18:02

General

  • Target

    777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe

  • Size

    12.0MB

  • MD5

    12cc724aa592230e7b53abc2ae617995

  • SHA1

    3513aed93a9a899c1e1bbce88d91a4bfb645637e

  • SHA256

    777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2

  • SHA512

    2606bde859e2e534553284f0f960a9fb3b1f6fe5bee38929fcbd48881099e89e497c191b021bf55c2e0da6486bd962edef1f4d31c81870da29131203c5c33435

  • SSDEEP

    393216:Jp2aafeDHntyT8XNaLuqSf8uVdwjy82OzS24nJ47yFNfqf:7MfWHl8sffTOWfn1Nf8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe
    "C:\Users\Admin\AppData\Local\Temp\777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Users\Admin\AppData\Local\Temp\777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe
      "C:\Users\Admin\AppData\Local\Temp\777eed3493029510ce630d796353e1d64463569ba78b0f43375709d3c4c279e2.exe" d
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\fa1c32bbf8783093a48554002794d171.ini

    Filesize

    3KB

    MD5

    51ace1941fe6a6e56f604c573ca5e604

    SHA1

    37c2795d7d17c58c89ed407a4a9c98181d2614ef

    SHA256

    d5eee7a884da0e1925a7d2c2ab47543c41fc20b9239fa5ace3e56017b33764b8

    SHA512

    13e6e2a3b36a5b0af80c709375eb99e031408386874fabbc3e761af4c2c0a46d3fc657186d6937aabccb8fe39b9bf0e23fa7d2ccd8eb1beade50b8c7f19a85ec

  • memory/1028-3-0x00000000004F8000-0x00000000004F9000-memory.dmp

    Filesize

    4KB

  • memory/1028-2-0x0000000000400000-0x0000000000973000-memory.dmp

    Filesize

    5.4MB

  • memory/1028-4-0x0000000000400000-0x0000000000973000-memory.dmp

    Filesize

    5.4MB

  • memory/1028-134-0x0000000006F10000-0x0000000007483000-memory.dmp

    Filesize

    5.4MB

  • memory/2920-135-0x0000000000400000-0x0000000000973000-memory.dmp

    Filesize

    5.4MB

  • memory/2920-136-0x0000000000400000-0x0000000000973000-memory.dmp

    Filesize

    5.4MB

  • memory/2920-163-0x0000000000400000-0x0000000000973000-memory.dmp

    Filesize

    5.4MB

  • memory/2920-165-0x0000000000400000-0x0000000000973000-memory.dmp

    Filesize

    5.4MB