Analysis

  • max time kernel
    153s
  • max time network
    160s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    09-09-2021 00:02

General

  • Target

    BBEE2132C158E1F3CA52FECFC2E0F3AF061336E7DCE9A.exe

  • Size

    93KB

  • MD5

    2fb14f79f89503e1ef4616df1ef4139e

  • SHA1

    8761ec8741c54c78f6959cf565babe76a2f321f8

  • SHA256

    bbee2132c158e1f3ca52fecfc2e0f3af061336e7dce9ad7a529191bf9d92491e

  • SHA512

    e9db04a686203a3370c9973ea7a22b0acc6291a864856cd6bf62a7b3a378e0223b49cde30c247d4392c4cee267aaf2ca5026cfbc49042722a8f77c52454763a6

Score
8/10

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 4 IoCs
  • Drops autorun.inf file 1 TTPs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BBEE2132C158E1F3CA52FECFC2E0F3AF061336E7DCE9A.exe
    "C:\Users\Admin\AppData\Local\Temp\BBEE2132C158E1F3CA52FECFC2E0F3AF061336E7DCE9A.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\BBEE2132C158E1F3CA52FECFC2E0F3AF061336E7DCE9A.exe" "BBEE2132C158E1F3CA52FECFC2E0F3AF061336E7DCE9A.exe" ENABLE
      2⤵
        PID:3848
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\BBEE2132C158E1F3CA52FECFC2E0F3AF061336E7DCE9A.exe"
        2⤵
          PID:4180
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\BBEE2132C158E1F3CA52FECFC2E0F3AF061336E7DCE9A.exe" "BBEE2132C158E1F3CA52FECFC2E0F3AF061336E7DCE9A.exe" ENABLE
          2⤵
            PID:1616

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Initial Access

        Replication Through Removable Media

        1
        T1091

        Persistence

        Modify Existing Service

        1
        T1031

        Lateral Movement

        Replication Through Removable Media

        1
        T1091

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1616-117-0x0000000000000000-mapping.dmp
        • memory/3848-115-0x0000000000000000-mapping.dmp
        • memory/4180-116-0x0000000000000000-mapping.dmp
        • memory/4796-114-0x0000000001800000-0x0000000001801000-memory.dmp
          Filesize

          4KB