Resubmissions

09-05-2023 19:22

230509-x3fn4adg58 10

09-05-2023 19:14

230509-xxsrgaff7x 10

09-05-2023 19:14

230509-xxr5yadg42 7

09-05-2023 19:14

230509-xxrt6sff7w 8

09-05-2023 19:14

230509-xxrjeaff7v 8

09-05-2023 19:14

230509-xxqxwadg39 7

09-05-2023 19:14

230509-xxql4sff7t 10

09-05-2023 19:14

230509-xxqbcadg38 7

09-05-2023 19:10

230509-xvl6xadf64 10

Analysis

  • max time kernel
    165s
  • max time network
    169s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-05-2023 19:14

General

  • Target

    trojan-leaks-main/dobrota/Clean/dobrota_clean.exe

  • Size

    7.7MB

  • MD5

    c8b999419a3c103270290e99189f794c

  • SHA1

    90148745b61d2c77c1694e43f11faaa9a3d05a0a

  • SHA256

    9093ff3bc7e78cfe84cadc3a993eeb1c15ce497e94efdcf51c1adcafd0aedf18

  • SHA512

    6e95c693eef199c511c81052b1b4e9bdbd94bcd2fee2b16660ece026e86e3535c2389fe91049407842c2cad81ab9f0521865edb28708f961d804f32111d4c47c

  • SSDEEP

    98304:JJx19RrCwXU7tTao36KJt6Oe2NhqCZao4+Axhy4V7FLEMUH82Z3dFRsFVsKtOepA:9thk7IInbrIh17FFWZnR0VsAHndDNE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\dobrota\Clean\dobrota_clean.exe
    "C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\dobrota\Clean\dobrota_clean.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\start_dobrota.bat" "
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3808
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\sound.vbs"
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        PID:1928
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\erroricons.exe
        erroricons.exe
        3⤵
        • Executes dropped EXE
        PID:2628
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\INVERS.exe
        INVERS.exe
        3⤵
        • Executes dropped EXE
        PID:4720
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\crazywarningicons.exe
        crazywarningicons.exe
        3⤵
        • Executes dropped EXE
        PID:2776
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\crazyinvers.exe
        crazyinvers.exe
        3⤵
        • Executes dropped EXE
        PID:3000
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\erroriconscursor.exe
        erroriconscursor.exe
        3⤵
        • Executes dropped EXE
        PID:1132
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\toonel.exe
        toonel.exe
        3⤵
        • Executes dropped EXE
        PID:4796
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\messages2.vbs"
        3⤵
          PID:2772
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\messages.vbs"
          3⤵
            PID:4876
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x39c
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:764

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb
        Filesize

        64KB

        MD5

        3ccce0151f32ba235f216844f7db1355

        SHA1

        976ccbb36115ca7de8660b8e3ca0f33654854291

        SHA256

        f576f15480b78be8fe17b4fb6447bb4663ed2af9b7615bd93642c145833911bc

        SHA512

        b000c49004808d52301f1c686e5e79fb296087dde8cca28a0e014db7854d3ecca069b416eb140d89c87dedf9eec70d22b7fa7afa716be644b35551d672ed143d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML
        Filesize

        9KB

        MD5

        7050d5ae8acfbe560fa11073fef8185d

        SHA1

        5bc38e77ff06785fe0aec5a345c4ccd15752560e

        SHA256

        cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

        SHA512

        a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\INVERS.exe
        Filesize

        2.3MB

        MD5

        5134f289dbf4abae370e3f36b637b73e

        SHA1

        c78d3f2d00dc47da0112a74df665c7a84a8e32c3

        SHA256

        e69c9383b5d9fe4e069ddee15797c52e9116f883ad3b1717d2519621ab2751b2

        SHA512

        0bf61a04b93b1ba5b8a0e2d9a1c333cc4605350a4c797cc9f5f78fec698d6f4fd62d329513ed406e76a06aa6af0f00d206da723e5a33315ce8de7f68f2002cb5

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\crazyinvers.exe
        Filesize

        2.3MB

        MD5

        a44458813e819777013eb3e644d74362

        SHA1

        2dd0616ca78e22464cf0cf68ef7915358a16f9ee

        SHA256

        47f0e9a90d45b193e81d3e60b7a43e5a4550a07a3dd1f7c98110fde12265d999

        SHA512

        1a4723a36f55cf696f33a7927571bda403e81ced32fda85c7cf25c8458897fb187e46bf5f80c26542725a9a7e5aa0e961fd3f3b110ae8f54b3b96b3e5dfc8215

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\crazywarningicons.exe
        Filesize

        1.2MB

        MD5

        e21bb4749a8b1b6fc26a7bcf57781836

        SHA1

        89cb0bd80d691ca650ad01551be3acefa2256ebd

        SHA256

        0ecbb8099ed1d9a1673165d3c4c9bbde88dd9678540a98b99434ff23b9e6d82c

        SHA512

        b0ccf421e415f94b6f0497dd041a8e7693d01d72cd577eca771d2049516f7a0c8c7221da642e5c38d5bc95a2335279d36f956314bda442b99a2d244bcc73b47b

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dobrota.mp3
        Filesize

        6.6MB

        MD5

        fad2e8c2a096f4593a03a771bbe99458

        SHA1

        88af47f279b9ea008901a6a242466f40f44e8a5c

        SHA256

        a40dd9aedae52766593bce06a9a68d47fcf8d430f254ce5e50b0c55587d46213

        SHA512

        7b607d2927bfb5d2ae3da7ad40fc842f6c1cd12cbc8814a043950d65f50d8084aaa8a544fe51312e68bde9434b138c5c8df50568650658ed0600f447a4a32441

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\erroricons.exe
        Filesize

        316KB

        MD5

        7f31508d95be3fe50e4e9aa646e86a12

        SHA1

        c61b439d6e17d630728f48c09b36af2647940748

        SHA256

        994efdb644ca1acb029dfd8d8eeba440e1cb74d93841b17f21165b9900730b15

        SHA512

        2e2b01e84a3476b47a9c703b71ce31887e4a4fa9340780f0cbbd20601be621bf00b9619df8bec0e81b2825550150c477c5071d921104a4c6265ef2d5a9e77eda

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\erroriconscursor.exe
        Filesize

        316KB

        MD5

        135eeb256e92d261066cfd3ffd31fb3e

        SHA1

        5c275ffd2ab1359249bae8c91bebcab19a185e91

        SHA256

        f0fe346146c30129ed6f507906c973f1a54c7d8dd8821c97e9b6edc42545699d

        SHA512

        a3792f92b116851023620d862cac6d2b5542de41390b6b8d223074db94193f0ee6dfcc9d6588ea3e77173f73c7fdfc5f9a1e1044c597636fe275d9ff4b76a12b

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\messages.vbs
        Filesize

        37B

        MD5

        35fbf9bf29760b9e120b37900b3c1343

        SHA1

        8a231c37ee13e72f27a38411668fde6fef3ff5bc

        SHA256

        e1cdab59df6508013e8b91c71043c8ecfe81b94a037706147ed19adf992539e6

        SHA512

        d1c12b6690c6b90dda5ad3e226e30adc848b3c324f929dec373ab6c7606fbcab716c49c4446efadf14036583924f8f094491bfe8bef380fd877c00cf9feaacc6

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\messages2.vbs
        Filesize

        37B

        MD5

        63954d8930e517637c254f9da0749e7a

        SHA1

        27f6a13c0e9530166d62b4586c3d2bda5cb5064c

        SHA256

        bffa14678b8c39c2fbfa54b76fbac5f750aebc8dc2954da10a55b7f1f90f351c

        SHA512

        dd5df6b8a64523fedb5aaced7d864013d12e6930015d8fd2267b11cffe76741c3a7907814a832ff7589476a51d16e8ab0fc566f4ac0784f6a599070080c7008d

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\sound.vbs
        Filesize

        216B

        MD5

        c36c15e1f99e1c0d093b9b089b1073c5

        SHA1

        47a237639f83d8de0c2034831ff3e12a3bad7408

        SHA256

        3d6123cae8ac645d9c9d33b0dada869a7fdd5117a2bf0f9080e4e30fe5bed736

        SHA512

        4283b45c6483e2ed6e9741f5937bb7851e101fb4710bd687a73a77b5abcb820d2480deaee50c8e87a7f225cee2430836da75d201838e9d989e91f3c0c0c60d1f

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\start_dobrota.bat
        Filesize

        205B

        MD5

        47fef7e366f39175f9467a5a33675b40

        SHA1

        4a55fdc489cb4b67517e04fe1eadc63dfff7b232

        SHA256

        7670d34d64f41ae60bffdd902e4d566b7fdd0c7782738782d5a8dbe59cce2001

        SHA512

        ea5ee454f8fa4ce2e7519c3b8772a8083586d4c4eefa981410c17d67d0ae8e8e716f8693d331a040d5fd29cb007988af2472a0b36840805098be492f863a4e28

      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\toonel.exe
        Filesize

        317KB

        MD5

        a84257e64cfbd9f6c0a574af416bc0d1

        SHA1

        245649583806d63abb1b2dc1947feccc8ce4a4bc

        SHA256

        fe7ff85b95ec06ce0f3cb49fdfa4d36de1f08669d36d381794aaf597510afad7

        SHA512

        6fc85ee0f8c75a25193fc4883a734704a8190253348c158b9cef4b918cffee5c8997c5248ec2bc793f66978e8cb4c5233d300d112f1d7750bc660698414865c2

      • memory/1132-206-0x0000000000400000-0x0000000000454000-memory.dmp
        Filesize

        336KB

      • memory/1928-186-0x0000000007940000-0x0000000007950000-memory.dmp
        Filesize

        64KB

      • memory/1928-184-0x0000000007940000-0x0000000007950000-memory.dmp
        Filesize

        64KB

      • memory/1928-183-0x0000000007940000-0x0000000007950000-memory.dmp
        Filesize

        64KB

      • memory/1928-185-0x0000000007940000-0x0000000007950000-memory.dmp
        Filesize

        64KB

      • memory/1928-182-0x0000000007940000-0x0000000007950000-memory.dmp
        Filesize

        64KB

      • memory/1928-181-0x0000000007940000-0x0000000007950000-memory.dmp
        Filesize

        64KB

      • memory/2628-202-0x0000000000400000-0x0000000000454000-memory.dmp
        Filesize

        336KB

      • memory/2776-204-0x0000000000400000-0x0000000000541000-memory.dmp
        Filesize

        1.3MB

      • memory/3000-205-0x0000000000400000-0x0000000000582000-memory.dmp
        Filesize

        1.5MB

      • memory/4720-203-0x0000000000400000-0x0000000000582000-memory.dmp
        Filesize

        1.5MB

      • memory/4796-207-0x0000000000400000-0x0000000000454000-memory.dmp
        Filesize

        336KB