Analysis

  • max time kernel
    53s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    30/06/2023, 07:18

General

  • Target

    27.6.2023 bbq 9w 300pc.exe

  • Size

    655KB

  • MD5

    761a8f1a031798a2912a2fc2ccd33ea3

  • SHA1

    37a2a91c93a0f9c1d90476e3cbf52155bb154d65

  • SHA256

    612f3aecb33df03a30f2c2a09ce41160d90a2388cbaf75f1f4e3fb2ee218e178

  • SHA512

    311b99f0dbfb9dc898486b29e132ee680fbdc8b2809fd76ed4d542f94c95e023863eed342eddf389f4ceea5e674c76e553c95e747d95c0a3766af21cf4d90008

  • SSDEEP

    12288:Scxb3RhVajstYyf4b8sTBeOMn821E3z/7J:dbLAwtQAs1FMvo

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27.6.2023 bbq 9w 300pc.exe
    "C:\Users\Admin\AppData\Local\Temp\27.6.2023 bbq 9w 300pc.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:680
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wFPnvHUkYoxjyC.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:268
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wFPnvHUkYoxjyC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3479.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1700
    • C:\Users\Admin\AppData\Local\Temp\27.6.2023 bbq 9w 300pc.exe
      "C:\Users\Admin\AppData\Local\Temp\27.6.2023 bbq 9w 300pc.exe"
      2⤵
        PID:284
      • C:\Users\Admin\AppData\Local\Temp\27.6.2023 bbq 9w 300pc.exe
        "C:\Users\Admin\AppData\Local\Temp\27.6.2023 bbq 9w 300pc.exe"
        2⤵
          PID:1640
        • C:\Users\Admin\AppData\Local\Temp\27.6.2023 bbq 9w 300pc.exe
          "C:\Users\Admin\AppData\Local\Temp\27.6.2023 bbq 9w 300pc.exe"
          2⤵
            PID:1380
          • C:\Users\Admin\AppData\Local\Temp\27.6.2023 bbq 9w 300pc.exe
            "C:\Users\Admin\AppData\Local\Temp\27.6.2023 bbq 9w 300pc.exe"
            2⤵
              PID:1388
            • C:\Users\Admin\AppData\Local\Temp\27.6.2023 bbq 9w 300pc.exe
              "C:\Users\Admin\AppData\Local\Temp\27.6.2023 bbq 9w 300pc.exe"
              2⤵
                PID:1632

            Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\tmp3479.tmp

                    Filesize

                    1KB

                    MD5

                    6d71e7fa41f43eb4e49114164b6bde86

                    SHA1

                    08952a43df8cede39cce200cc88de0d22c599c2f

                    SHA256

                    e38e957d3f36cf0703606b4436bb084b52a3950e0cd37749bd3cabb2e78ba21d

                    SHA512

                    04dbedd91b579db807ad760624db08ed32a0f084f1a7aaa05feff2ba77a90fb1b0ec5c89907d9fc8eff2dcc6e188453a18ffa548485fc3619307affeeea70d72

                  • memory/268-67-0x00000000025B0000-0x00000000025F0000-memory.dmp

                    Filesize

                    256KB

                  • memory/680-54-0x0000000000380000-0x000000000042A000-memory.dmp

                    Filesize

                    680KB

                  • memory/680-55-0x0000000001E10000-0x0000000001E50000-memory.dmp

                    Filesize

                    256KB

                  • memory/680-56-0x0000000000370000-0x000000000037C000-memory.dmp

                    Filesize

                    48KB

                  • memory/680-57-0x0000000001E10000-0x0000000001E50000-memory.dmp

                    Filesize

                    256KB

                  • memory/680-58-0x0000000000450000-0x000000000045C000-memory.dmp

                    Filesize

                    48KB

                  • memory/680-59-0x0000000007EB0000-0x0000000007F2C000-memory.dmp

                    Filesize

                    496KB