Analysis

  • max time kernel
    299s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 17:59

General

  • Target

    hypno.exe

  • Size

    867KB

  • MD5

    d5b1d3d2b7a94a95ae09f5e25e3fdc28

  • SHA1

    9c6aed952277f1b0d5b8a95233326988442f2ed9

  • SHA256

    9a1cba95c631ba10afe33167928ccdaf2f8cde644d79212d36e63a815d711c8a

  • SHA512

    0a282ed2b893569233f72d93f78168749959df577bb84e326ce3596a87ba25a6107b8c39070699628c7a403a3094daa573d27e9b5dd540db095640b84940dccf

  • SSDEEP

    12288:DMYB9oY6c8IJpFL4KDESOsm0cVIgCJD1rTL:DMYzQczN4KDESPm0gIXDJTL

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\hypno.exe
    "C:\Users\Admin\AppData\Local\Temp\hypno.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\eee.hta"
      2⤵
      • Blocklisted process makes network request
      • Modifies Internet Explorer settings
      PID:2428
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\eee.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Windows\SysWOW64\taskkill.exe
        "C:\Windows\System32\taskkill.exe" /f /im explorer.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2676
    • C:\Users\Admin\AppData\Local\Temp\vmfreeze.exe
      "C:\Users\Admin\AppData\Local\Temp\vmfreeze.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2904

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\eee.hta
    Filesize

    639B

    MD5

    37f082625c16ac358ae7080d8c9c89bb

    SHA1

    204b768d48ca4edfcf206f06b1b282747dbc8291

    SHA256

    30c714391889aca0a9406bccd5965c1b1dbeb0e3984a52f5a47b1495ef0e727a

    SHA512

    210479430c1fcaeb9b4d0e56f74b8413817984f94c2d8dbf808d7cba8bdde07d77dd4bca99232a6f695d4ca282445ee41ae3745c68cba003bfed765b3d565129

  • C:\Users\Admin\AppData\Local\Temp\eee.vbs
    Filesize

    110B

    MD5

    440a37dc2d1674bf7a62ec24a502d77d

    SHA1

    b486f7d85113d4d13b4c3e62ee3a6e81bcdc515d

    SHA256

    1d77aadf3d56d11b5437579bf7fd25166d00a95a123419ae8b10daf156dc4ca6

    SHA512

    9bba57886afb207a6d6ae8a31a789d5499c905e94815018b6efd8e12eb2f7691534fc637513f638d0dff6560aa2007d056268d9484fdf8e0954a3e1b2719f652

  • \Users\Admin\AppData\Local\Temp\vmfreeze.exe
    Filesize

    1.1MB

    MD5

    26d5dbfe207187a6454377851137da82

    SHA1

    37e3a793c374f2c0ccb5a2fc5c4abf71adcc0845

    SHA256

    669babc694e34715b556a6bd09f025c8254039a659cb8a501b6ec587e07c80d9

    SHA512

    e168cb47c2b7ddf59c60095ae99807eb3d7a095686e1d980b6169b55ec668a02f29967f4b627e2aa16b37c19666a46744b67131016c423417e50ea3b730dbc16