Analysis

  • max time kernel
    74s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 16:42

General

  • Target

    Hotmail Checker.rar

  • Size

    667KB

  • MD5

    25d5d8e397837f866ee0062beae405c8

  • SHA1

    ed1b40f91ba22c6ee5fb78dc77fc3c3a4dc6738e

  • SHA256

    0de1f1739dfc278a21c75d17be004aa2ea212896d18e56a4495f7b118cd7d7a1

  • SHA512

    00fe4697e5fda99467872ff3d8ae5f45a7dea3e8cbdf5db8c935f8291c777dd095a3fc4a543171bd6c076e304a6fc1285aaedbbd6d8da24bf6badde9dc682881

  • SSDEEP

    12288:8qlOkp1CyGNVql3fY308oLdCCqJEr4EnFROLyKeoc31UJmarmojLw56TmfNoj:1lOkpYyGNElvJAlO4EFRTPoYdAxj1ifE

Score
1/10

Malware Config

Signatures

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Hotmail Checker.rar"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zOC5623EA7\Start Checker.bat" "
      2⤵
        PID:2128
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zOC56EB8A7\Start Checker.bat" "
        2⤵
          PID:2940
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zOC56134A7\Start Checker.bat" "
          2⤵
            PID:2852
          • C:\Windows\system32\NOTEPAD.EXE
            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zOC56237C7\keyword.txt
            2⤵
            • Opens file in notepad (likely ransom note)
            PID:2572
          • C:\Windows\system32\cmd.exe
            cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zOC56C4158\Start Checker.bat" "
            2⤵
              PID:2988
            • C:\Windows\system32\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zOC560FC48\Start Checker.bat" "
              2⤵
                PID:1652
              • C:\Windows\system32\cmd.exe
                cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zOC5673948\Start Checker.bat" "
                2⤵
                  PID:2860
                • C:\Windows\system32\cmd.exe
                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zOC56D4548\Start Checker.bat" "
                  2⤵
                    PID:2032
                  • C:\Windows\system32\cmd.exe
                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zOC5634148\Start Checker.bat" "
                    2⤵
                      PID:1760
                    • C:\Windows\system32\cmd.exe
                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zOC56D6B78\Start Checker.bat" "
                      2⤵
                        PID:1424
                      • C:\Windows\system32\cmd.exe
                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\7zOC56B4678\Start Checker.bat" "
                        2⤵
                          PID:560

                      Network

                      MITRE ATT&CK Matrix

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\7zOC5623EA7\Start Checker.bat

                        Filesize

                        63B

                        MD5

                        7cd830db1b8da52c0062cc6f260a9685

                        SHA1

                        ed401d18b0095fc94e4809b7d1ff433dd05697f4

                        SHA256

                        d3347618ea5777b3d58e2005afbebe1e9d484405919333f41bc0ddb189261758

                        SHA512

                        c735b66dc15a37221b65e9350115db78ee55cb3ef11f401bc9f744be2b1283a16937d62ca8344c071febd6ddd4ccf924b001bbb79a5d03519bf49328264ae097