Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 21:59

General

  • Target

    $TEMPLATES/redalert3.exe

  • Size

    49KB

  • MD5

    9a0d407e720246d6a48ef7cc369c49ef

  • SHA1

    cd7e422b3130298e2075838a7ccdd6eaedd2ca1f

  • SHA256

    5cd375441e87c3e728694fa7d956fedde62e5bc537e4c615a60107902f5fe58e

  • SHA512

    b70d8068a69b54dfe598852178d3c88b71a5d445108d5aab0a1f068dda58b71906740a838a1497fae543c8bf276812164f50b0103a5828b9cc278c9d6e94d215

  • SSDEEP

    768:2hMZ0dF4ZFvQbn+eePu3cIQGCGbiC4k42M3wJJEX7NQz2r0/djiJXj+Jp:2yZMSZFvknTePMZd4k4kJJELR6dkG

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 13 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$TEMPLATES\redalert3.exe
    "C:\Users\Admin\AppData\Local\Temp\$TEMPLATES\redalert3.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4136
    • C:\Windows\SysWOW64\regedit.exe
      regedit.exe /s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\kjfs.reg"
      2⤵
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Runs .reg file with regedit
      PID:4580

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsc86DB.tmp\System.dll

          Filesize

          10KB

          MD5

          2b54369538b0fb45e1bb9f49f71ce2db

          SHA1

          c20df42fda5854329e23826ba8f2015f506f7b92

          SHA256

          761dcdf12f41d119f49dbdca9bcab3928bbdfd8edd67e314d54689811f9d3e2f

          SHA512

          25e4898e3c082632dfd493756c4cc017decbef43ffa0b68f36d037841a33f2a1721f30314a85597ac30c7ecc99b7257ea43f3a903744179578a9c65fcf57a8b7

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\kjfs.reg

          Filesize

          292B

          MD5

          cfb618699ec57373511da638964db3e1

          SHA1

          db21b9920309072ab99fd6ae186d807c5033f224

          SHA256

          5fe9110e3d21d291d9d55d4830ed71597b60b671987067435b97888c7074bbde

          SHA512

          76f445ffea81e71c28c3785e91f74213950ed73eaeece926e194005dbbe3d92368d3cd6323a496528f2bcd3da851259e93fabbc22db7cbbe23c911c9c1e0ac75