Resubmissions

11/10/2022, 17:08

221011-vnmsrafbdn 6

10/10/2022, 15:31

221010-syaj3acdb3 10

09/10/2022, 15:59

221009-tfb6lshbg4 10

09/10/2022, 15:28

221009-swtvxshceq 10

09/10/2022, 13:04

221009-qa2brshab7 10

09/10/2022, 13:03

221009-qaj3gshab6 1

09/10/2022, 12:59

221009-p8jnyahaa6 10

09/10/2022, 12:54

221009-p5m7yshbdm 10

08/10/2022, 21:32

221008-1dxg4afgb8 10

08/10/2022, 13:52

221008-q6p9daegh5 1

Analysis

  • max time kernel
    375s
  • max time network
    1596s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/10/2022, 15:28

General

  • Target

    fucker script.exe

  • Size

    104KB

  • MD5

    db0655efbe0dbdef1df06207f5cb5b5b

  • SHA1

    a8d48d5c0042ce359178d018c0873e8a7c2f27e8

  • SHA256

    52972a23ab12b95cd51d71741db2cf276749e56030c092e2e4f0907dcb1fbd56

  • SHA512

    5adc8463c3e148a66f8afdeefc31f2b3ffeb12b7641584d1d24306b0898da60a8b9b948bb4f9b7d693185f2daa9bd9437b3b84cebc0eabfa84dfcef6938e1704

  • SSDEEP

    1536:m5iT3FccnYWkyjWpOku3yUyJCbyVAvy7+fRo:3LOcxkyjW3wvHq

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fucker script.exe
    "C:\Users\Admin\AppData\Local\Temp\fucker script.exe"
    1⤵
      PID:1792
    • C:\Windows\system32\pcwrun.exe
      C:\Windows\system32\pcwrun.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" CompatTab
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4864
      • C:\Windows\System32\msdt.exe
        C:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCWDAB5.xml /skip TRUE
        2⤵
        • Suspicious use of FindShellTrayWindow
        PID:1148
    • C:\Windows\System32\sdiagnhost.exe
      C:\Windows\System32\sdiagnhost.exe -Embedding
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5116
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k SDRSVC
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4836
    • C:\Windows\system32\pcwrun.exe
      C:\Windows\system32\pcwrun.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" CompatTab
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Windows\System32\msdt.exe
        C:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCWF7B3.xml /skip TRUE
        2⤵
        • Suspicious use of FindShellTrayWindow
        PID:4260
    • C:\Windows\system32\pcwrun.exe
      C:\Windows\system32\pcwrun.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" CompatTab
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4272
      • C:\Windows\System32\msdt.exe
        C:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCWF7C2.xml /skip TRUE
        2⤵
        • Suspicious use of FindShellTrayWindow
        PID:4936
    • C:\Windows\System32\sdiagnhost.exe
      C:\Windows\System32\sdiagnhost.exe -Embedding
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2640
    • C:\Windows\System32\sdiagnhost.exe
      C:\Windows\System32\sdiagnhost.exe -Embedding
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4876
    • C:\Windows\system32\pcwrun.exe
      C:\Windows\system32\pcwrun.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" CompatTab
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Windows\System32\msdt.exe
        C:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCWFBAA.xml /skip TRUE
        2⤵
        • Suspicious use of FindShellTrayWindow
        PID:2252
    • C:\Windows\System32\sdiagnhost.exe
      C:\Windows\System32\sdiagnhost.exe -Embedding
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4432
    • C:\Windows\system32\pcwrun.exe
      C:\Windows\system32\pcwrun.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" CompatTab
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Windows\System32\msdt.exe
        C:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCW407.xml /skip TRUE
        2⤵
        • Suspicious use of FindShellTrayWindow
        PID:416
    • C:\Windows\System32\msdt.exe
      C:\Windows\System32\msdt.exe -path C:\Windows\diagnostics\index\PCWDiagnostic.xml -af C:\Users\Admin\AppData\Local\Temp\PCW3C9.xml /skip TRUE
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:4420
    • C:\Windows\system32\pcwrun.exe
      C:\Windows\system32\pcwrun.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" CompatTab
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4676
    • C:\Windows\System32\sdiagnhost.exe
      C:\Windows\System32\sdiagnhost.exe -Embedding
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2452
    • C:\Windows\System32\sdiagnhost.exe
      C:\Windows\System32\sdiagnhost.exe -Embedding
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\fclgxrj2\fclgxrj2.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3476
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1B58.tmp" "c:\Users\Admin\AppData\Local\Temp\fclgxrj2\CSC69D45DDF639C4C49ADBD5A2DA9247A43.TMP"
          3⤵
            PID:4768

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\ElevatedDiagnostics\733862231\latest.cab

        Filesize

        7KB

        MD5

        2acda9afde4a2b6e1f2673e13e3b1932

        SHA1

        8516ebeed556ecf9f308758330904c69f305d3ac

        SHA256

        48c56b450e3ebe3b36ef3cba57b36e19f31aeaaf962ab364d47bc314329f8310

        SHA512

        f90e949b8fba9b7910157eeff8ee3c3830a4eaf9402c7e810bc4b79db739ad8bec8729101dd30b53ab9739260c2b2cdc996b5694c8fb9a8015bfb4b7afd77b2b

      • C:\Users\Admin\AppData\Local\ElevatedDiagnostics\733862231\latest.cab

        Filesize

        7KB

        MD5

        359def8545271306833a47cf0f3e67c2

        SHA1

        3d8d65deb4d78fde0979e22487885425602d843f

        SHA256

        f97e518f0c409e7ee6a6570f9791f33fd74d72ce642229e500d5a0fc56349c89

        SHA512

        75b9720bd4f6e2ab67c380692aec4a2ee543aa0fac1ec9a8b82255db4e18afb2589f40888afd65b9004f6368c47b397dc91ae79970c41f6ef893d4557bf58cd6

      • C:\Users\Admin\AppData\Local\ElevatedDiagnostics\733862231\latest.cab

        Filesize

        7KB

        MD5

        54e26fb7d15b3bee261361fb0e30eadd

        SHA1

        280b536a83b5d64cee5000e16cde4dedf976289f

        SHA256

        2d288b1a625414b304a58923ee8eba3855f68da8648545c331e3be5595403a97

        SHA512

        1cbf84765417aa6a23590589c3063c2f7ea783ca9ab76798ed3e18beb991e90e19a78f6b6a510248c2df2c7aa68c2cec18c26432adbb2622b05d01d470c3f897

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sdiagnhost.exe.log

        Filesize

        5KB

        MD5

        25fdef6a8f0b8331ebcd537f9b8f6276

        SHA1

        38d6ab3038e1abdf29cc9ef325aaba5f0ab9bcc8

        SHA256

        99b3c40b32c01c8a2922c9cd4b43264f9f6cc5b773a9320fc697a44bc03873b3

        SHA512

        33546bc2c65bc048256073f91672fe07366d067d1bf41413fdfa7e87953f1d582130dd41129f1d310dc034cfc26056b78c1d39de24a42707941cbf5ddc71c2ba

      • C:\Users\Admin\AppData\Local\Temp\PCW3C9.xml

        Filesize

        742B

        MD5

        59b12d98f5afa5329432bb91de176d82

        SHA1

        fd77de31b9a8ec7c58981cd84e1a374efbc0b7fc

        SHA256

        3ad36b17f40ed8c113cf372dcc31af5ec3ea0d6aa649c8c82ed1e0c60482c5fd

        SHA512

        94a653d4830a1573dccaedc97d6cc576c4acfa95e5c625c11c86e3b1afb9d5e8e10f5ee9ad1d339803b227c0b67acb2a3e93b60b6dbe7a1262a639846b6bec06

      • C:\Users\Admin\AppData\Local\Temp\PCW407.xml

        Filesize

        742B

        MD5

        59b12d98f5afa5329432bb91de176d82

        SHA1

        fd77de31b9a8ec7c58981cd84e1a374efbc0b7fc

        SHA256

        3ad36b17f40ed8c113cf372dcc31af5ec3ea0d6aa649c8c82ed1e0c60482c5fd

        SHA512

        94a653d4830a1573dccaedc97d6cc576c4acfa95e5c625c11c86e3b1afb9d5e8e10f5ee9ad1d339803b227c0b67acb2a3e93b60b6dbe7a1262a639846b6bec06

      • C:\Users\Admin\AppData\Local\Temp\PCWDAB5.xml

        Filesize

        742B

        MD5

        59b12d98f5afa5329432bb91de176d82

        SHA1

        fd77de31b9a8ec7c58981cd84e1a374efbc0b7fc

        SHA256

        3ad36b17f40ed8c113cf372dcc31af5ec3ea0d6aa649c8c82ed1e0c60482c5fd

        SHA512

        94a653d4830a1573dccaedc97d6cc576c4acfa95e5c625c11c86e3b1afb9d5e8e10f5ee9ad1d339803b227c0b67acb2a3e93b60b6dbe7a1262a639846b6bec06

      • C:\Users\Admin\AppData\Local\Temp\PCWF7B3.xml

        Filesize

        742B

        MD5

        59b12d98f5afa5329432bb91de176d82

        SHA1

        fd77de31b9a8ec7c58981cd84e1a374efbc0b7fc

        SHA256

        3ad36b17f40ed8c113cf372dcc31af5ec3ea0d6aa649c8c82ed1e0c60482c5fd

        SHA512

        94a653d4830a1573dccaedc97d6cc576c4acfa95e5c625c11c86e3b1afb9d5e8e10f5ee9ad1d339803b227c0b67acb2a3e93b60b6dbe7a1262a639846b6bec06

      • C:\Users\Admin\AppData\Local\Temp\PCWF7C2.xml

        Filesize

        742B

        MD5

        59b12d98f5afa5329432bb91de176d82

        SHA1

        fd77de31b9a8ec7c58981cd84e1a374efbc0b7fc

        SHA256

        3ad36b17f40ed8c113cf372dcc31af5ec3ea0d6aa649c8c82ed1e0c60482c5fd

        SHA512

        94a653d4830a1573dccaedc97d6cc576c4acfa95e5c625c11c86e3b1afb9d5e8e10f5ee9ad1d339803b227c0b67acb2a3e93b60b6dbe7a1262a639846b6bec06

      • C:\Users\Admin\AppData\Local\Temp\PCWFBAA.xml

        Filesize

        742B

        MD5

        59b12d98f5afa5329432bb91de176d82

        SHA1

        fd77de31b9a8ec7c58981cd84e1a374efbc0b7fc

        SHA256

        3ad36b17f40ed8c113cf372dcc31af5ec3ea0d6aa649c8c82ed1e0c60482c5fd

        SHA512

        94a653d4830a1573dccaedc97d6cc576c4acfa95e5c625c11c86e3b1afb9d5e8e10f5ee9ad1d339803b227c0b67acb2a3e93b60b6dbe7a1262a639846b6bec06

      • C:\Users\Admin\AppData\Local\Temp\RES1B58.tmp

        Filesize

        1KB

        MD5

        11142208e4edd6971a6a3a0aa1fd5d4a

        SHA1

        4cefd4ce0a1ec804e165e77d44fee8cd385d4ee6

        SHA256

        a9c5ce01c7daef8e124b9876f2dfbbe05945a85dfa96d3b4ab5671fde0fec693

        SHA512

        6342ab6c68a3c35a89a9e96cc033d5b33ff8bc4d8e02929a6702f3672039de083c4c338116e43f13346e553951ab32bdc7fde730d19f33cdd2a12500b3bf403d

      • C:\Users\Admin\AppData\Local\Temp\fclgxrj2\fclgxrj2.dll

        Filesize

        5KB

        MD5

        ebd28882f221d2ad68e8d20e1aae77e3

        SHA1

        a670acbeda1835445c0def625b49c0c4b5113a17

        SHA256

        c24718cd281c8165004b45b4c75061ad47562ca18d169b4e889ca5b76b930e10

        SHA512

        fd0121b11916e816ae11a8990d711141b88a1fb36d3d977fffad9395bde926e56b0b6b7a49d9f64632ae5ab43d231f3df18f497a080a3563a470bf1a0a4b62f5

      • C:\Windows\TEMP\SDIAG_3f554a7c-5f2c-418d-bf88-7b59fb722cda\TS_ProgramCompatibilityWizard.ps1

        Filesize

        16KB

        MD5

        2c245de268793272c235165679bf2a22

        SHA1

        5f31f80468f992b84e491c9ac752f7ac286e3175

        SHA256

        4a6e9f400c72abc5b00d8b67ea36c06e3bc43ba9468fe748aebd704947ba66a0

        SHA512

        aaecb935c9b4c27021977f211441ff76c71ba9740035ec439e9477ae707109ca5247ea776e2e65159dcc500b0b4324f3733e1dfb05cef10a39bb11776f74f03c

      • C:\Windows\TEMP\SDIAG_3f554a7c-5f2c-418d-bf88-7b59fb722cda\en-US\CL_LocalizationData.psd1

        Filesize

        6KB

        MD5

        5202c2aaa0bbfbcbdc51e271e059b066

        SHA1

        3f6a9ffb0455edc6a7e4170b54def16fd6e09a28

        SHA256

        7fd5c0595d76d6dec1fcbace5bbcd8ff531d5acf97e53234c0008ff5a89d20e2

        SHA512

        77500b97fcd6fe985962f8430f97627fedcf5af72d73d5e2b03e130bca1b6b552971b569be5fca5c9ece75ab92c2e4be416d67a0f24d3830d9579e5f96103ac9

      • C:\Windows\TEMP\SDIAG_71945957-872f-45c6-a1f1-57ead9dce9ee\TS_ProgramCompatibilityWizard.ps1

        Filesize

        16KB

        MD5

        2c245de268793272c235165679bf2a22

        SHA1

        5f31f80468f992b84e491c9ac752f7ac286e3175

        SHA256

        4a6e9f400c72abc5b00d8b67ea36c06e3bc43ba9468fe748aebd704947ba66a0

        SHA512

        aaecb935c9b4c27021977f211441ff76c71ba9740035ec439e9477ae707109ca5247ea776e2e65159dcc500b0b4324f3733e1dfb05cef10a39bb11776f74f03c

      • C:\Windows\TEMP\SDIAG_71945957-872f-45c6-a1f1-57ead9dce9ee\en-US\CL_LocalizationData.psd1

        Filesize

        6KB

        MD5

        5202c2aaa0bbfbcbdc51e271e059b066

        SHA1

        3f6a9ffb0455edc6a7e4170b54def16fd6e09a28

        SHA256

        7fd5c0595d76d6dec1fcbace5bbcd8ff531d5acf97e53234c0008ff5a89d20e2

        SHA512

        77500b97fcd6fe985962f8430f97627fedcf5af72d73d5e2b03e130bca1b6b552971b569be5fca5c9ece75ab92c2e4be416d67a0f24d3830d9579e5f96103ac9

      • \??\c:\Users\Admin\AppData\Local\Temp\fclgxrj2\CSC69D45DDF639C4C49ADBD5A2DA9247A43.TMP

        Filesize

        652B

        MD5

        3f3ec038789d6444f4bc844797025d0a

        SHA1

        eae6514087ce5b6919c220e015a52faaaa22f19d

        SHA256

        a1fbaaba84f06110c365195475e55be5082280d92824634ade36a27a435579be

        SHA512

        9425104126f62d5b42033885190bfa52269784787f8058718d9ea4e6098ddca1ea2c764fc0d6b0b9227ba05c1391a014ed1c468a725addaf90d5c78659a578e1

      • \??\c:\Users\Admin\AppData\Local\Temp\fclgxrj2\fclgxrj2.0.cs

        Filesize

        5KB

        MD5

        26294ce6366662ebde6319c51362d56c

        SHA1

        c571c0ffa13e644eed87523cbd445f4afb1983d1

        SHA256

        685699daafafa281093b5c368c4d92715949fc300b182d234e800e613be5d8dc

        SHA512

        bc91bb591368bc511ca5169b3c23cd69a163eeb77f0d7a083fe09cc6aa15d7044a24f95811fa1518f44368dffda6d346f44e1568e7a5373a6450a63ae31883ee

      • \??\c:\Users\Admin\AppData\Local\Temp\fclgxrj2\fclgxrj2.cmdline

        Filesize

        356B

        MD5

        b6e68a97c065e8c43f1333ff614e6c83

        SHA1

        d6b581d4e125fd13ca517d86162208498d443627

        SHA256

        1d252037c19ed0e1e1141af8dd386066edf07a2376b509b1466666a58868ad6f

        SHA512

        970e504b305a702ae38f5cf40db557f6b9dbd763fc18d81e3cf48b1a306a9eea42f9e7f0e5500073dc72d8d0f11928d1b0f1c1a27f470242cf8376fa50b70edf

      • memory/1044-293-0x0000019DF6BC0000-0x0000019DF6BC8000-memory.dmp

        Filesize

        32KB

      • memory/1792-133-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-134-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-141-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-121-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-122-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-123-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-140-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-124-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-139-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-138-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-125-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-137-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-136-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-135-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-126-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-142-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-120-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-132-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-131-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-130-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-129-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-128-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/1792-127-0x0000000077CB0000-0x0000000077E3E000-memory.dmp

        Filesize

        1.6MB

      • memory/5116-155-0x000002B4C01C0000-0x000002B4C0236000-memory.dmp

        Filesize

        472KB

      • memory/5116-152-0x000002B4A7940000-0x000002B4A7962000-memory.dmp

        Filesize

        136KB