Analysis

  • max time kernel
    14s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14-07-2024 23:31

General

  • Target

    $_2_/TenioDL/TenioDL.exe

  • Size

    333KB

  • MD5

    ce472064b917fdd429b07d10880c487f

  • SHA1

    0c092116d67a5447f1f632c4e0e65a3b516a892c

  • SHA256

    bdf2209a2cb6a7b9c3a0be4a7a0abdf988f446a4232973c6204ee2e4a2ed632a

  • SHA512

    2b158fc4498e3756c17c8b44d2fc2464d62c639b6d425e72301c0f9b6f359a67e011d647c8de698c9e794cef0e65cb9efda34b63ed060611d97b0eadbf3c88d7

  • SSDEEP

    6144:9TqmoyUiZ4Q5ihITwRYoOhQYtm5p4qpBtV/A5MGdTKLUaAxkBbOC+OJOh69A:9loyDZ4Q5ihRYEYtm5p4qpBtVo5MGdTh

Score
7/10

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$_2_\TenioDL\TenioDL.exe
    "C:\Users\Admin\AppData\Local\Temp\$_2_\TenioDL\TenioDL.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Windows\SysWOW64\icacls.exe
      "C:\Windows\System32\icacls.exe" C:\Users\Admin\AppData\Roaming\Tencent\Config\ /t /setintegritylevel low
      2⤵
      • Modifies file permissions
      PID:1804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Tencent\Config\p2p_common.ini

    Filesize

    94B

    MD5

    838dd099875c8f5ec41fa83a6d48f45d

    SHA1

    36dff6a1186537ea5e85685fff048013ecd16b97

    SHA256

    5cdcebba9b2994e22464a34f47f91213a2e0fc04ff37cb3079c85141714bad51

    SHA512

    10e5b4f486de595a44bfaf47e8b9815b6468f80055d254f78bf0553733d745b61cd6a463bb764c80c0b7cae391e3953a508646d79aad3cd22681723506a8f0f9

  • memory/2376-1-0x0000000001E90000-0x0000000001EFD000-memory.dmp

    Filesize

    436KB

  • memory/2376-2-0x00000000004D0000-0x0000000000518000-memory.dmp

    Filesize

    288KB

  • memory/2376-4-0x0000000000460000-0x0000000000486000-memory.dmp

    Filesize

    152KB

  • memory/2376-6-0x0000000003670000-0x00000000036DE000-memory.dmp

    Filesize

    440KB