Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2023, 18:37

General

  • Target

    ThunderBird.exe

  • Size

    47.0MB

  • MD5

    794340f45de887fb5ff3ffe1c11a4e6d

  • SHA1

    b8d7bba33a9763936f169249d7b71809233c52c5

  • SHA256

    b4c3d5aef9813e7e1c14480b0090609a9665d86fafc5f8e2a0f4f432a400b32c

  • SHA512

    c7eefb264eaa0adf77065a5c7a752325b025689ce6613e06875a3313e90dcfb4375bdf339b5601668fda97a3bb1598d964ac56b324a6315bf6994b125e2382be

  • SSDEEP

    786432:BtakRWH1pLCgJqrYW1zC8MQ7Hx6IVswnbOo52bAJ6g6:BQkQP+aMpC8MQEnl1bAJ6D

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:1172
  • C:\Users\Admin\AppData\Local\Temp\ThunderBird.exe
    "C:\Users\Admin\AppData\Local\Temp\ThunderBird.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3780
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "chcp"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4740
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:688
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -c "Add-Type -Name Window -Namespace Console -MemberDefinition ' [DllImport(\"Kernel32.dll\")] public static extern IntPtr GetConsoleWindow(); [DllImport(\"user32.dll\")] public static extern bool ShowWindow(IntPtr hWnd, Int32 nCmdShow); ' $consolePtr = [Console.Window]::GetConsoleWindow() #0 hide [Console.Window]::ShowWindow($consolePtr, 0) "
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4880
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ceurdopr\ceurdopr.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1852
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9AE8.tmp" "c:\Users\Admin\AppData\Local\Temp\ceurdopr\CSCDD5D21EF97AF43ED89293F5A2CA66F.TMP"
            4⤵
              PID:2832
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3068
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4708
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1064
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
          2⤵
            PID:4660
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:452
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:436
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:3600
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4904
            • C:\Windows\system32\findstr.exe
              findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
              3⤵
                PID:3328
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2704
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "%windir%\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4364
              • C:\Windows\System32\reg.exe
                C:\Windows\System32\reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid
                3⤵
                  PID:4272
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /d /s /c ""undefined\VBoxManage.exe" list vms --long"
                2⤵
                  PID:4604

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                Filesize

                2KB

                MD5

                2f57fde6b33e89a63cf0dfdd6e60a351

                SHA1

                445bf1b07223a04f8a159581a3d37d630273010f

                SHA256

                3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                SHA512

                42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                2f87410b0d834a14ceff69e18946d066

                SHA1

                f2ec80550202d493db61806693439a57b76634f3

                SHA256

                5422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65

                SHA512

                a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                c8c43d0eaefbfd1be22f01ccd909cf97

                SHA1

                13fcf45f10e63f19f08d28bcf8ae9f6e95bd7f00

                SHA256

                029fd6ba7fd95649ba1100cb57068985007088bf9b82d68a12904b7ee45434da

                SHA512

                4b915638afe2be0246aac7c40916597c86ee6f1ac35dd77d20a7746960346ef697f530b03251f301fe8e687f6e3fa37640df4b9727d29b2f80440478c931c974

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                b7c93769b2711e60e835ded135786ae3

                SHA1

                fb1aedc8eafe539f466d3b0e8cfb34eb78478166

                SHA256

                abc46c311d4c4f53930e672a731e37c0ebb2339fd823a3ff6c4d8cfdc1f622aa

                SHA512

                89c46a5a09839fa71701a6789aa66de9b3f72ee8a9e70eb18cbe30599ff76b28a6b93a8db7688c039c625ac42a9f7b1bfd22f09820393b7cce7cc5a040908265

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                8078045e4d5a1794600849c8e676d471

                SHA1

                75313723e11fc47cf3f64545e5ba46ddaafbdcf1

                SHA256

                5f8984ba3ec22741410893c298a8769fc0ffd4f5e784b7f647446a060b609980

                SHA512

                66f81d898c2ff6ab9e3738d2d69afaf3c0d60738e311d3faa79b9923244a0dd55817af5c1a6be3d6fe8783bea9981ef62b79650f03c5cad7a5e373c32abe5b7b

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                542ab3a1ae2ed388aa7282ba2157e45e

                SHA1

                89bfe976951a12a62212b65a410224935806e371

                SHA256

                4e624a10fa040f13964d436454c89f9dc44d8f89ebe9875e3a73266e946253d7

                SHA512

                09516a828424a4ab5243be826f7ca996f7e04f6fb87b53bfc2867762b7033caa4419b98642f963e6bf272883ac25d027866e4cf7ee582418a1a2195ac8ad5896

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                Filesize

                2KB

                MD5

                542ab3a1ae2ed388aa7282ba2157e45e

                SHA1

                89bfe976951a12a62212b65a410224935806e371

                SHA256

                4e624a10fa040f13964d436454c89f9dc44d8f89ebe9875e3a73266e946253d7

                SHA512

                09516a828424a4ab5243be826f7ca996f7e04f6fb87b53bfc2867762b7033caa4419b98642f963e6bf272883ac25d027866e4cf7ee582418a1a2195ac8ad5896

              • C:\Users\Admin\AppData\Local\Temp\RES9AE8.tmp

                Filesize

                1KB

                MD5

                74ec389778084e20f7a03d8a5108af18

                SHA1

                b62cb5eaaa3498362ddc8e290b2a6f6c9e49971f

                SHA256

                88f9ffe4c974777df08ee8e28c44133d529e0df7fe8fbb1cb74d1606e0c93fc0

                SHA512

                4856c463e77008e5bd35fc737571c7fc32e71dad1b1e4feaadfa7c395fd1360d1bd40f19f1d4191be389fae25050a04d62f2d8e17681ffc2813d2e7b103059b9

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_weoxquiq.jpz.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • C:\Users\Admin\AppData\Local\Temp\ceurdopr\ceurdopr.dll

                Filesize

                3KB

                MD5

                aa9138d05f20e9c33175bbdc819324d2

                SHA1

                5cbce38c048cd4e45c73b453ac7bdee8b7fb03c1

                SHA256

                d99f2639d8c5a336d6adfc5d197f52871b6576dc8e6d44666e9136a9c3e660e4

                SHA512

                67a9978d20ba1102ebad6d37e2ba0be3de4015afff6ed2c8e99991b761077cd514e34ebcf2fc7aa92716133986b48a33860b76ab4eb6a9e86f209e2bcb8b8741

              • \??\c:\Users\Admin\AppData\Local\Temp\ceurdopr\CSCDD5D21EF97AF43ED89293F5A2CA66F.TMP

                Filesize

                652B

                MD5

                2b002f90f5d5ecf4ccb735507e175ecd

                SHA1

                c37c5f16db9d1cf42703a686b12a4e410f0599bc

                SHA256

                bc7c56f1b9695cb84c368a6dac6b2fb9271c94df3ac74e9cd6553d373c38329a

                SHA512

                f9f832e1d1f597622a2da78ec43754162ae9e7ab9d35ed5162bf5781817965b2f8ce9f1a8705dc00b1d0d6545b49ee9d73c5cf33d425b4ec0650af79f0c3a0f2

              • \??\c:\Users\Admin\AppData\Local\Temp\ceurdopr\ceurdopr.0.cs

                Filesize

                312B

                MD5

                ecbf151f81ff98f7dff196304a40239e

                SHA1

                ccf6b97b6f8276656b042d64f0595963fe9ec79c

                SHA256

                295ca195631c485c876e7c468ddcbb3fe7cd219d3e5005a2441be2de54e62ac8

                SHA512

                4526a59055a18af6c0c13fb9f55a9a9bc15aa1407b697849e19b6cc32c88ee7206b3efff806bd154d36bce144ae1d9c407c6ea0f5077c54fbe92cd172c203720

              • \??\c:\Users\Admin\AppData\Local\Temp\ceurdopr\ceurdopr.cmdline

                Filesize

                369B

                MD5

                b40293fa9b11b29b23c1be97d66879c9

                SHA1

                0f3368afb8408593c6c018ecba26e69806062d83

                SHA256

                7b7b2c8643b792b273ccb4a9e534d2d7e537c945878946a4f89865817f6388e0

                SHA512

                a1944660972c0b7d7b2eae073eb7619871832a59c90913f5f3b8a583ad3a83576c401fe6717086901dc535b9f7d018fa2a095aee80b36c5abe9f35515d761c66

              • memory/436-257-0x000002A6BF8F0000-0x000002A6BF900000-memory.dmp

                Filesize

                64KB

              • memory/452-244-0x0000017D7E8F0000-0x0000017D7E900000-memory.dmp

                Filesize

                64KB

              • memory/2704-273-0x0000018BFB2F0000-0x0000018BFB300000-memory.dmp

                Filesize

                64KB

              • memory/3068-160-0x000001BB77580000-0x000001BB775C4000-memory.dmp

                Filesize

                272KB

              • memory/3068-143-0x000001BB77050000-0x000001BB77072000-memory.dmp

                Filesize

                136KB

              • memory/3068-174-0x000001BB775D0000-0x000001BB775FA000-memory.dmp

                Filesize

                168KB

              • memory/3068-175-0x000001BB775D0000-0x000001BB775F4000-memory.dmp

                Filesize

                144KB

              • memory/3068-157-0x000001BB74900000-0x000001BB74910000-memory.dmp

                Filesize

                64KB

              • memory/3068-158-0x000001BB74900000-0x000001BB74910000-memory.dmp

                Filesize

                64KB

              • memory/3068-166-0x000001BB77650000-0x000001BB776C6000-memory.dmp

                Filesize

                472KB

              • memory/3600-256-0x000001B94F050000-0x000001B94F060000-memory.dmp

                Filesize

                64KB

              • memory/3600-254-0x000001B94F050000-0x000001B94F060000-memory.dmp

                Filesize

                64KB

              • memory/4708-200-0x0000022F8A7A0000-0x0000022F8A7B0000-memory.dmp

                Filesize

                64KB

              • memory/4708-199-0x0000022F8A7A0000-0x0000022F8A7B0000-memory.dmp

                Filesize

                64KB

              • memory/4708-198-0x0000022F8A7A0000-0x0000022F8A7B0000-memory.dmp

                Filesize

                64KB

              • memory/4880-162-0x000001FF62080000-0x000001FF62090000-memory.dmp

                Filesize

                64KB

              • memory/4880-161-0x000001FF62080000-0x000001FF62090000-memory.dmp

                Filesize

                64KB

              • memory/4880-159-0x000001FF62080000-0x000001FF62090000-memory.dmp

                Filesize

                64KB