Analysis

  • max time kernel
    119s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2023 09:52

General

  • Target

    6627242e23c929ac597a6c017e3d95cf4d2a2720dbf88be018b9ebb5f62cbff2.exe

  • Size

    1.8MB

  • MD5

    942d5eca841451b44df488a35d5ac238

  • SHA1

    aff676bc19e554e7f0df1ac9f616798f8354c8f6

  • SHA256

    6627242e23c929ac597a6c017e3d95cf4d2a2720dbf88be018b9ebb5f62cbff2

  • SHA512

    f88aea1f7bc7c3b8a83a78d9adec2ff2729f840d38509ecfda803b4fcbe691aeb0c1277bb7c4c0b782f505bed73214b158e98e75b123642864b5efe17a2c8744

  • SSDEEP

    24576:pGGYB3mONH/xAeLaNhseUuKJD/7rmtElsR4lhu7zuTVA3nzZ6WhZlXVnHOqLTE3M:MB3DNZAWaNhsx+iZhMuTq3BDtuET6g3

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 35 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6627242e23c929ac597a6c017e3d95cf4d2a2720dbf88be018b9ebb5f62cbff2.exe
    "C:\Users\Admin\AppData\Local\Temp\6627242e23c929ac597a6c017e3d95cf4d2a2720dbf88be018b9ebb5f62cbff2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\*¸ßÊý¿Î¼þ*.exe" /F /A /Q
      2⤵
        PID:3840
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del "C:\Users\Admin\AppData\Local\Temp\*ÈÎÕý·Ç*.mp4" /F /A /Q
        2⤵
          PID:2880
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c del "C:\Users\Admin\AppData\Local\Temp\*¸ßµÈÊýѧ*.mp4" /F /A /Q
          2⤵
            PID:244
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c del "C:\Users\Admin\AppData\Local\Temp\Ö÷³ÌÐò*.exe" /F /A /Q
            2⤵
              PID:1356
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\e568c47Ol2O.bat
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1036
              • C:\Windows\SysWOW64\explorer.exe
                explorer C:\Users\Admin\AppData\Local\Temp
                3⤵
                  PID:3768
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 1736
                2⤵
                • Program crash
                PID:2332
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 1716
                2⤵
                • Program crash
                PID:4248
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2120 -ip 2120
              1⤵
                PID:1120
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2120 -ip 2120
                1⤵
                  PID:4860
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
                  1⤵
                  • Modifies Internet Explorer settings
                  • Modifies registry class
                  • Suspicious behavior: AddClipboardFormatListener
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of SetWindowsHookEx
                  PID:2336
                • C:\Windows\System32\rundll32.exe
                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                  1⤵
                    PID:2712

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Discovery

                  System Information Discovery

                  1
                  T1082

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\e568c47Ol2O.bat
                    Filesize

                    352B

                    MD5

                    9a8b6c05c30286e8c00cdca1e1694834

                    SHA1

                    766ec91ac3484b893bc26983b213145462a4dbb5

                    SHA256

                    d8750df56ac931f1c8c6895faf857ed71451dde701cd3a9ffc6d4aa382b8d5a6

                    SHA512

                    571206d001d9017d41c8c4cb07b5f80ce59314582f7babb219bad46a69c76d1e579ccdb5100cd3f0b309112dcc410f8fda282de71b467dcb53eb77353fc5f46d

                  • memory/2120-160-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-141-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-163-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-140-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-162-0x0000000003A60000-0x0000000003A61000-memory.dmp
                    Filesize

                    4KB

                  • memory/2120-144-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-146-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-148-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-150-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-152-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-154-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-165-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-158-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-133-0x0000000000660000-0x0000000000A01000-memory.dmp
                    Filesize

                    3.6MB

                  • memory/2120-136-0x0000000000660000-0x0000000000A01000-memory.dmp
                    Filesize

                    3.6MB

                  • memory/2120-135-0x0000000000660000-0x0000000000A01000-memory.dmp
                    Filesize

                    3.6MB

                  • memory/2120-156-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-167-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-169-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-171-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-173-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-175-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-177-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-179-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-181-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-183-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-185-0x0000000010000000-0x0000000010051000-memory.dmp
                    Filesize

                    324KB

                  • memory/2120-134-0x0000000000660000-0x0000000000A01000-memory.dmp
                    Filesize

                    3.6MB

                  • memory/2120-189-0x0000000000660000-0x0000000000A01000-memory.dmp
                    Filesize

                    3.6MB