Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2023, 04:49

General

  • Target

    e092af3320c668d973ca003e7ecc387f.exe

  • Size

    666KB

  • MD5

    e092af3320c668d973ca003e7ecc387f

  • SHA1

    93505578ef679ae9ba85e4369fe2d3b9404e22fe

  • SHA256

    5b55637a26181e3420983b78038cedc5b9f3b10ac3cf0b904c6f9195f3b28baa

  • SHA512

    8c156369576652b9016cc8247af9e29ce13028d28142c797d324bb82a0eb0e33626c9d7a6f9cc59e7a41b99c86af2aa790ee34a2d605df124970bd14c655970a

  • SSDEEP

    12288:G/OvYe2xpDl+C2DLrst5BQdeBpzFxVegSKv/s7OkqhtDNA1C0aepmKsEJdb:G/OvWSst5WmVeg/v/aPsJI7fr

Score
7/10

Malware Config

Signatures

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e092af3320c668d973ca003e7ecc387f.exe
    "C:\Users\Admin\AppData\Local\Temp\e092af3320c668d973ca003e7ecc387f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CwcZttCoAu.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4068
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CwcZttCoAu" /XML "C:\Users\Admin\AppData\Local\Temp\tmp22E5.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4208
    • C:\Users\Admin\AppData\Local\Temp\e092af3320c668d973ca003e7ecc387f.exe
      "C:\Users\Admin\AppData\Local\Temp\e092af3320c668d973ca003e7ecc387f.exe"
      2⤵
        PID:1236
      • C:\Users\Admin\AppData\Local\Temp\e092af3320c668d973ca003e7ecc387f.exe
        "C:\Users\Admin\AppData\Local\Temp\e092af3320c668d973ca003e7ecc387f.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4872

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_p0hc50fe.ife.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmp22E5.tmp

      Filesize

      1KB

      MD5

      748373aebd7cd3a0af02c7a8247f2360

      SHA1

      4a1d8046e3fa8e9204ac1d380ecffeaae4b505fe

      SHA256

      e6179f2b83261dff2b6f9022db74c850eab034a53537753c02a5c0db0e45a5f7

      SHA512

      bd864016afc73246a674c48233c7b1fa01b57a4928c31e2573caa7b0522bf066b0dbcd46b043f76cc7319da3941df19a1bebfc6bf2218e1f71718357df005fea

    • memory/2520-133-0x0000000000850000-0x00000000008FC000-memory.dmp

      Filesize

      688KB

    • memory/2520-135-0x0000000005850000-0x0000000005DF4000-memory.dmp

      Filesize

      5.6MB

    • memory/2520-136-0x0000000005340000-0x00000000053D2000-memory.dmp

      Filesize

      584KB

    • memory/2520-137-0x0000000005570000-0x0000000005580000-memory.dmp

      Filesize

      64KB

    • memory/2520-138-0x00000000052F0000-0x00000000052FA000-memory.dmp

      Filesize

      40KB

    • memory/2520-139-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/2520-140-0x0000000005570000-0x0000000005580000-memory.dmp

      Filesize

      64KB

    • memory/2520-141-0x0000000009AA0000-0x0000000009B3C000-memory.dmp

      Filesize

      624KB

    • memory/2520-134-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/2520-164-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-147-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-173-0x0000000070BC0000-0x0000000070C0C000-memory.dmp

      Filesize

      304KB

    • memory/4068-151-0x0000000005910000-0x0000000005F38000-memory.dmp

      Filesize

      6.2MB

    • memory/4068-197-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-153-0x0000000005810000-0x0000000005832000-memory.dmp

      Filesize

      136KB

    • memory/4068-194-0x0000000007E40000-0x0000000007E48000-memory.dmp

      Filesize

      32KB

    • memory/4068-148-0x00000000052D0000-0x00000000052E0000-memory.dmp

      Filesize

      64KB

    • memory/4068-193-0x0000000007E60000-0x0000000007E7A000-memory.dmp

      Filesize

      104KB

    • memory/4068-146-0x0000000005200000-0x0000000005236000-memory.dmp

      Filesize

      216KB

    • memory/4068-157-0x00000000060F0000-0x0000000006156000-memory.dmp

      Filesize

      408KB

    • memory/4068-192-0x00000000052D0000-0x00000000052E0000-memory.dmp

      Filesize

      64KB

    • memory/4068-169-0x00000000067F0000-0x000000000680E000-memory.dmp

      Filesize

      120KB

    • memory/4068-170-0x00000000052D0000-0x00000000052E0000-memory.dmp

      Filesize

      64KB

    • memory/4068-171-0x000000007EFC0000-0x000000007EFD0000-memory.dmp

      Filesize

      64KB

    • memory/4068-172-0x0000000007790000-0x00000000077C2000-memory.dmp

      Filesize

      200KB

    • memory/4068-149-0x00000000052D0000-0x00000000052E0000-memory.dmp

      Filesize

      64KB

    • memory/4068-191-0x0000000007D50000-0x0000000007D5E000-memory.dmp

      Filesize

      56KB

    • memory/4068-183-0x0000000006DA0000-0x0000000006DBE000-memory.dmp

      Filesize

      120KB

    • memory/4068-185-0x0000000008140000-0x00000000087BA000-memory.dmp

      Filesize

      6.5MB

    • memory/4068-186-0x0000000007B00000-0x0000000007B1A000-memory.dmp

      Filesize

      104KB

    • memory/4068-187-0x0000000007B70000-0x0000000007B7A000-memory.dmp

      Filesize

      40KB

    • memory/4068-188-0x0000000007D80000-0x0000000007E16000-memory.dmp

      Filesize

      600KB

    • memory/4068-189-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/4068-190-0x00000000052D0000-0x00000000052E0000-memory.dmp

      Filesize

      64KB

    • memory/4872-184-0x00000000065E0000-0x0000000006630000-memory.dmp

      Filesize

      320KB

    • memory/4872-156-0x00000000056A0000-0x00000000056B0000-memory.dmp

      Filesize

      64KB

    • memory/4872-163-0x0000000005960000-0x00000000059C6000-memory.dmp

      Filesize

      408KB

    • memory/4872-155-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/4872-152-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/4872-198-0x0000000074890000-0x0000000075040000-memory.dmp

      Filesize

      7.7MB

    • memory/4872-199-0x00000000056A0000-0x00000000056B0000-memory.dmp

      Filesize

      64KB