Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 20:57

General

  • Target

    hyperinjector-main.zip

  • Size

    6KB

  • MD5

    6ca50361462ac1991dd2baf066c8f939

  • SHA1

    067d84c52b6d9d303a273cc2876fed48b6e2fc7f

  • SHA256

    8ef3b04176dc84f5a3c9b3d5aab39fd9ba424f335ce17e7e401e724758a45f4a

  • SHA512

    e57bff517275c99c3f8c95d4ab97217c45eb1dba36bac4de65d2cea408d44731c864fc68bc9e4e870e455672d6085fa374627bba0df3d8fe997f5968b0719731

  • SSDEEP

    192:YjldYPMj0/AU3xcJDvQLoJM/NcuZtpo3pF:YjluWLUhcJMiocpF

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\hyperinjector-main.zip
    1⤵
      PID:1792
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2688
      • C:\Windows\system32\SearchIndexer.exe
        C:\Windows\system32\SearchIndexer.exe /Embedding
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2528
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:1136
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 508 512 520 65536 516
          2⤵
          • Modifies data under HKEY_USERS
          PID:768
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Temp1_hyperinjector-main.zip\hyperinjector-main\README.md
        1⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2424
        • C:\Windows\system32\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_hyperinjector-main.zip\hyperinjector-main\README.md
          2⤵
            PID:2272
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\Documents\hyperinjector-main\hyperinjector-main\start.bat" "
          1⤵
            PID:2840
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Documents\hyperinjector-main\hyperinjector-main\hyperinjector.py
            1⤵
            • Modifies registry class
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of WriteProcessMemory
            PID:2828
            • C:\Windows\system32\NOTEPAD.EXE
              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\hyperinjector-main\hyperinjector-main\hyperinjector.py
              2⤵
                PID:2644

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

              Filesize

              1024KB

              MD5

              cf9c2f860937ef409d320b78111a6590

              SHA1

              0572e7a11c9e818e9626e3e5438abf1728c3e0fa

              SHA256

              c15a955992021f4640e40f8aa18b459521458b904c2e0153d944f40118b5c660

              SHA512

              6e50d2894588f79d33ffd93e069d848ef9fe64b5dfbcbc1ed5379768555d5dfed4bc8d9e5cf9a58e56b14e73d80c49363a23966b0fe0ccd8c9e2ff08720618b7

            • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSStmp.log

              Filesize

              1024KB

              MD5

              bd45f868c00dc340c8b970a2b0027e62

              SHA1

              f66b01c5f03959619fd8bcfda9934a5ced571671

              SHA256

              c012cc4e73ec2d93c0f861de59dd37995933f90c0a99c43a4b6cc6a5a963496f

              SHA512

              8b9fd9100e4bea23e934520d1e841028a0b0999920b05ba95f38f66b4bb9ced6c444008da4ffe5dd8e483c03491a371374006959164c7091b3da14f180986168

            • memory/2528-74-0x0000000005270000-0x0000000005278000-memory.dmp

              Filesize

              32KB

            • memory/2528-75-0x0000000005260000-0x0000000005261000-memory.dmp

              Filesize

              4KB

            • memory/2528-43-0x0000000001440000-0x0000000001441000-memory.dmp

              Filesize

              4KB

            • memory/2528-49-0x0000000001440000-0x0000000001448000-memory.dmp

              Filesize

              32KB

            • memory/2528-51-0x0000000001370000-0x0000000001371000-memory.dmp

              Filesize

              4KB

            • memory/2528-60-0x0000000001490000-0x0000000001498000-memory.dmp

              Filesize

              32KB

            • memory/2528-66-0x0000000003330000-0x0000000003338000-memory.dmp

              Filesize

              32KB

            • memory/2528-71-0x0000000003810000-0x0000000003818000-memory.dmp

              Filesize

              32KB

            • memory/2528-17-0x0000000001C90000-0x0000000001CA0000-memory.dmp

              Filesize

              64KB

            • memory/2528-42-0x0000000001480000-0x0000000001488000-memory.dmp

              Filesize

              32KB

            • memory/2528-77-0x00000000054C0000-0x00000000054C8000-memory.dmp

              Filesize

              32KB

            • memory/2528-78-0x00000000054B0000-0x00000000054B1000-memory.dmp

              Filesize

              4KB

            • memory/2528-86-0x00000000054B0000-0x00000000054B8000-memory.dmp

              Filesize

              32KB

            • memory/2528-90-0x0000000005500000-0x0000000005501000-memory.dmp

              Filesize

              4KB

            • memory/2528-98-0x0000000003960000-0x0000000003968000-memory.dmp

              Filesize

              32KB

            • memory/2528-99-0x0000000003950000-0x0000000003951000-memory.dmp

              Filesize

              4KB

            • memory/2528-0-0x0000000001B80000-0x0000000001B90000-memory.dmp

              Filesize

              64KB

            • memory/2528-102-0x0000000003950000-0x0000000003958000-memory.dmp

              Filesize

              32KB