Analysis

  • max time kernel
    70s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2023, 06:20

General

  • Target

    Leaked.exe

  • Size

    154KB

  • MD5

    f439af344fcdccd3abe98eb5c3d7e156

  • SHA1

    c5763f23be5f2b4e04e3e98a8ef891acf272d140

  • SHA256

    ee8bae144532bcbeacd941fa0291922079229b13b0f42eeaad6ca00ed3c050e0

  • SHA512

    85e5e2d5e91fadc4300c501db1bb6d46275c0e1deeb62ceaec45246c5e465f1a0f7998fb996874b716c5b0cfb3f99d45b8e3179fbcf1db16441a874219599fd0

  • SSDEEP

    1536:wC79gXAX271lcBzqEY2lkCswVxYDXosWkd09dlgaUGXmLcNoxs:1gXpJozm2lkCsuYDbM2ZXs

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Leaked.exe
    "C:\Users\Admin\AppData\Local\Temp\Leaked.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\abra.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:884
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Start-Process -Verb RunAs -FilePath '"C:\Users\Admin\AppData\Local\Temp\abra.bat"' -ArgumentList 'am_admin'"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\abra.bat" am_admin
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1060
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -ExecutionPolicy Bypass -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACgAWwBTAHkAcwB0AGUAbQAuAEUAbgB2AGkAcgBvAG4AbQBlAG4AdABdADoAOgBHAGUAdABFAG4AdgBpAHIAbwBuAG0AZQBuAHQAVgBhAHIAaQBhAGIAbABlACgAJwBVAFMARQBSAFAAUgBPAEYASQBMAEUAJwApACAAKwAgACcAJwApAA==
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1632
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1776 -s 2268
      2⤵
      • Program crash
      PID:316
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x51c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1804

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\abra.bat

    Filesize

    500B

    MD5

    c7e2ec60b2f5e2d1061e128318cd3f61

    SHA1

    54b2846e89d35a67698765d0b3920a1f05784bdd

    SHA256

    613bb088d6d7e0cfb3acf1037adab8eb36ddd2203c3646388a9cfaa7585e2b38

    SHA512

    8faabdcd2caf1e282ff7e6f5971a60e957ba5355d12a35db4b61b3de0672d9983791f4b05fab5656459733f188eb531749f64632619c9c192c31570b8a523869

  • C:\Users\Admin\AppData\Local\Temp\abra.bat

    Filesize

    500B

    MD5

    c7e2ec60b2f5e2d1061e128318cd3f61

    SHA1

    54b2846e89d35a67698765d0b3920a1f05784bdd

    SHA256

    613bb088d6d7e0cfb3acf1037adab8eb36ddd2203c3646388a9cfaa7585e2b38

    SHA512

    8faabdcd2caf1e282ff7e6f5971a60e957ba5355d12a35db4b61b3de0672d9983791f4b05fab5656459733f188eb531749f64632619c9c192c31570b8a523869

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    a1df330ed04f1541227e1e85050920f9

    SHA1

    2cc14aac1a6a68502e2687e3af4fce9dd49dfcc5

    SHA256

    11d4873ec880b522ca53f0488417b52203a0baf3a95207b7f03c01e728757e01

    SHA512

    dbe559a69fce9dea14e99cc070d76f15d1ac777ce73da1da3d82e261a277a5aeb3574a6e3e305741f69da5113933cb133b0d102e28e5576ef015d15b68abce46

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JSRI1S5PNCUIMC7GD58Y.temp

    Filesize

    7KB

    MD5

    a1df330ed04f1541227e1e85050920f9

    SHA1

    2cc14aac1a6a68502e2687e3af4fce9dd49dfcc5

    SHA256

    11d4873ec880b522ca53f0488417b52203a0baf3a95207b7f03c01e728757e01

    SHA512

    dbe559a69fce9dea14e99cc070d76f15d1ac777ce73da1da3d82e261a277a5aeb3574a6e3e305741f69da5113933cb133b0d102e28e5576ef015d15b68abce46

  • memory/1632-97-0x000000001B200000-0x000000001B4E2000-memory.dmp

    Filesize

    2.9MB

  • memory/1632-99-0x0000000002280000-0x0000000002288000-memory.dmp

    Filesize

    32KB

  • memory/1632-100-0x0000000002850000-0x00000000028D0000-memory.dmp

    Filesize

    512KB

  • memory/1632-101-0x0000000002854000-0x0000000002857000-memory.dmp

    Filesize

    12KB

  • memory/1632-102-0x000000000285B000-0x0000000002892000-memory.dmp

    Filesize

    220KB

  • memory/1640-86-0x0000000002320000-0x0000000002328000-memory.dmp

    Filesize

    32KB

  • memory/1640-87-0x0000000001E34000-0x0000000001E37000-memory.dmp

    Filesize

    12KB

  • memory/1640-88-0x0000000001E3B000-0x0000000001E72000-memory.dmp

    Filesize

    220KB

  • memory/1640-85-0x000000001B140000-0x000000001B422000-memory.dmp

    Filesize

    2.9MB

  • memory/1776-56-0x0000000061E80000-0x0000000061EA0000-memory.dmp

    Filesize

    128KB

  • memory/1776-55-0x0000000000210000-0x0000000000220000-memory.dmp

    Filesize

    64KB

  • memory/1776-57-0x00000000624B0000-0x00000000624C0000-memory.dmp

    Filesize

    64KB

  • memory/1776-58-0x0000000062560000-0x0000000062570000-memory.dmp

    Filesize

    64KB

  • memory/1776-89-0x0000000063940000-0x0000000063950000-memory.dmp

    Filesize

    64KB

  • memory/1776-59-0x0000000062B40000-0x0000000062B50000-memory.dmp

    Filesize

    64KB

  • memory/1776-60-0x0000000062B50000-0x0000000062B60000-memory.dmp

    Filesize

    64KB

  • memory/1776-61-0x0000000063560000-0x0000000063570000-memory.dmp

    Filesize

    64KB

  • memory/1776-98-0x00000000641D0000-0x00000000641E0000-memory.dmp

    Filesize

    64KB

  • memory/1776-96-0x0000000063960000-0x0000000063970000-memory.dmp

    Filesize

    64KB

  • memory/1776-62-0x00000000637C0000-0x00000000637D0000-memory.dmp

    Filesize

    64KB

  • memory/1776-91-0x0000000063950000-0x0000000063960000-memory.dmp

    Filesize

    64KB

  • memory/1776-63-0x0000000063930000-0x0000000063940000-memory.dmp

    Filesize

    64KB

  • memory/1776-54-0x0000000000280000-0x0000000000290000-memory.dmp

    Filesize

    64KB

  • memory/1776-103-0x0000000000280000-0x0000000000290000-memory.dmp

    Filesize

    64KB

  • memory/1776-104-0x0000000000210000-0x0000000000220000-memory.dmp

    Filesize

    64KB

  • memory/1776-105-0x0000000061E80000-0x0000000061EA0000-memory.dmp

    Filesize

    128KB

  • memory/1776-112-0x0000000063930000-0x0000000063940000-memory.dmp

    Filesize

    64KB

  • memory/1776-111-0x00000000637C0000-0x00000000637D0000-memory.dmp

    Filesize

    64KB

  • memory/1776-110-0x0000000063560000-0x0000000063570000-memory.dmp

    Filesize

    64KB

  • memory/1776-109-0x0000000062B50000-0x0000000062B60000-memory.dmp

    Filesize

    64KB

  • memory/1776-108-0x0000000062B40000-0x0000000062B50000-memory.dmp

    Filesize

    64KB

  • memory/1776-107-0x0000000062560000-0x0000000062570000-memory.dmp

    Filesize

    64KB

  • memory/1776-106-0x00000000624B0000-0x00000000624C0000-memory.dmp

    Filesize

    64KB

  • memory/1776-113-0x00000000624B0000-0x00000000624C0000-memory.dmp

    Filesize

    64KB