Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2023 09:49

General

  • Target

    7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe

  • Size

    108KB

  • MD5

    7856c463dafa41e9ee8057c2a53b8f5f

  • SHA1

    414659752d234ea615756ebe527a18dceba408f6

  • SHA256

    7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984

  • SHA512

    cd947cc251a6b30b936bc2d056b152925a5c4e848c495b7f2b2a7da2278a4ef16b61603d2875a5f36999f784a22ec23b44b5b26449aed054f746b22d62455c5f

  • SSDEEP

    3072:7iQpRQqbfY7QRPVAziuhArAy72GRSQIrD:RRQqbfYePV6iuhAr5KGiD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 10 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 11 IoCs
  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe
    "C:\Users\Admin\AppData\Local\Temp\7718f2e415211d8b300fbd981495365a6611cdd1e6487235beb3be386c250984.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\Sec.exe.zip C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Drops file in Windows directory
      PID:4968
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\Sec.ini.zip C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Drops file in Windows directory
      PID:3688
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\Sec1.exe.zip C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Drops file in Windows directory
      PID:4396
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\UpLog.txt.zip C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Drops file in Windows directory
      PID:2156
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\inc\GUI.inc.zip C:\Users\Admin\AppData\Local\Temp\inc\
      2⤵
      • Drops file in Windows directory
      PID:1996
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\inc\lib\gdi32.lib.zip C:\Users\Admin\AppData\Local\Temp\inc\lib\
      2⤵
      • Drops file in Windows directory
      PID:1012
    • C:\Windows\SysWOW64\expand.exe
      expand.exe -r -F:* C:\Users\Admin\AppData\Local\Temp\code\crc32.sec.zip C:\Users\Admin\AppData\Local\Temp\code\
      2⤵
      • Drops file in Windows directory
      PID:3092
    • C:\Users\Admin\AppData\Local\Temp\Sec.exe
      Sec.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Sec.exe

    Filesize

    108KB

    MD5

    dfa1023dace7cf6736ca42933f143761

    SHA1

    780a85fb446106f21bc8f2c9cecdc5af1c38f3e3

    SHA256

    722646faf82d73464a5ad89375d3ababd7bac310575d9b2fa903b162330df5a7

    SHA512

    26aab3dd9afb719f1e5f49f75af7ecf0bd345caa8f0c28974a7a079d54f3dba348e4e85dc60673010e3b43ba12b977c129c243d1c01a7151b16cb21577b79726

  • C:\Users\Admin\AppData\Local\Temp\Sec.exe

    Filesize

    108KB

    MD5

    dfa1023dace7cf6736ca42933f143761

    SHA1

    780a85fb446106f21bc8f2c9cecdc5af1c38f3e3

    SHA256

    722646faf82d73464a5ad89375d3ababd7bac310575d9b2fa903b162330df5a7

    SHA512

    26aab3dd9afb719f1e5f49f75af7ecf0bd345caa8f0c28974a7a079d54f3dba348e4e85dc60673010e3b43ba12b977c129c243d1c01a7151b16cb21577b79726

  • C:\Users\Admin\AppData\Local\Temp\Sec.ini

    Filesize

    180KB

    MD5

    dc71242c827305ef9608362bd8f7ae7f

    SHA1

    9cd2b8efd0a38c29fc309b1ca80a54cb1139998a

    SHA256

    08de077504ff3f9453e6dcd789c41feebaf24d335e9eec7f054a80faae63d2bc

    SHA512

    9bc733260dc4176bc5102a6b0a6d47857f065af28f6b752af576093e883cbdcc70a3fa5b80f9101a0d210fe8c80c9bfe969348d55ba7b95293cdc37a48f4e1b0

  • C:\Users\Admin\AppData\Local\Temp\Sec1.exe

    Filesize

    96KB

    MD5

    ce3d32362fb1c2e7fbba72cce95c3b0c

    SHA1

    a48c44ef67e0cf711733509e4233401f4f17380b

    SHA256

    76613df11b82f958b79783212b240701b12871db27a2050d32b4c6ae0d4dca1c

    SHA512

    d88e4b06893f7616a035f287c24115d666fc87d7319292a74534af0d29c7e2a8530b6da900266df43e47cb6224bfb7b4f1adba6dc5ad26ddf46dc7bda698ae93

  • C:\Users\Admin\AppData\Local\Temp\UpLog.txt

    Filesize

    28KB

    MD5

    ed0e0c142c05e3b4cb97929e8c045cf3

    SHA1

    734b648c9a6ab53a4eaba12668f545bdc0869212

    SHA256

    4f97c5f1be90b7cbed7bd3075561d09cb05cbb1e78d969fc06a152cbaac4f0d8

    SHA512

    efead23df6f778e0a02a991eaee164fd9cbe2d8638a317965367d30880e38fda6fce365e982109465d22eb7f8777b5f9c3d47088fb5f55a0129ee10d0f00d412

  • C:\Users\Admin\AppData\Local\Temp\code\crc32.sec

    Filesize

    1KB

    MD5

    b5413b8724dc740d100d83c5fb5474d6

    SHA1

    3d590964b543cc4fa5500fbff768fa2d0bf301de

    SHA256

    1acb643a84354be82518eece323c498c983236dd27001e9422c68d6c567cc65e

    SHA512

    b42f9b042db52e874b4e75f49fe90ba1a35573d734f8a43dc50c807129501821f263d8380b456cc4b0138c78519216ec64b3a356caac06fa393de195bd860b25

  • C:\Users\Admin\AppData\Local\Temp\inc\GUI.inc

    Filesize

    1KB

    MD5

    5d089846fdf9551981b4caa959168746

    SHA1

    efd43083b8b0fe656ed2ec9034bb82c38d50c86a

    SHA256

    2be5e2ff8dbfd24e189219de350550aa429e85aab9161daadeb0a25f91124204

    SHA512

    d54ba11884a3ba0a70280578ab2a16a8f7b0c3bc33ddd4d6d17e8b20b00b407f6834c531270e2a6d4ea3d28e18e6bdeccd2d61af1079547fedf93674567dadfd

  • C:\Users\Admin\AppData\Local\Temp\inc\lib\gdi32.lib

    Filesize

    14KB

    MD5

    28aa70c6d418cad7d09f72672682370b

    SHA1

    42f3903717183c6d6c7ab9d2d9b9cfe9c517dca6

    SHA256

    2c7c868dce813c91382b7d5d5414849019312abcd1996ee45946656f462b96e2

    SHA512

    15659d9b0225c2e6e02c02c771e8ae97568a415aa456217687e817fb8a92bb00f6c2afed245e83c2b78d7069aa310750f0cd4395f07a6fa086dde59d5859c539

  • C:\Windows\LOGS\DPX\setupact.log

    Filesize

    168KB

    MD5

    c6116ba71b3478911ace16f6f9c152a0

    SHA1

    c4b0052d014657d42297322649e68d59ea8b0913

    SHA256

    b64b7278dfd0e1a00c87ac34a383376d9bf3055bf2c571a4d6578c754e66aa43

    SHA512

    afe5149c5b40969f2be0f29565fd162aeac9c110a3cbaa7324410a7a7616075808ca59fbd7fd86ee109d9b9e74fafcc7b5cfc45dbfd4740e7929080ca399b175

  • C:\Windows\LOGS\DPX\setupact.log

    Filesize

    169KB

    MD5

    3729fc8ef0b4d757d7104993a957a3f0

    SHA1

    c574ad50a366d69b85f617c65c01faf4528271d0

    SHA256

    48f9680f6250c1342f8c1431be6928b894dfb155ac08d5310b9b14e9cbfb904d

    SHA512

    6a5756e044edfb8cc38d19ce96f310ec0089e6790a2cfd825849751f9b9564e1430138d200cb48ba3477b6d75e0c7c1192e3daf730ba323be9aae7758f48c43c

  • C:\Windows\LOGS\DPX\setupact.log

    Filesize

    170KB

    MD5

    d0cf3212f1b0fb8133f9fcecb084f3e9

    SHA1

    5119290476bee78ee6abbbad04c7bf0e1dd0370e

    SHA256

    339ba4741c2549c68e388625df34ef207ac2c8e94b8099ddd476817d10297f24

    SHA512

    5f2cb2441e40673a5348ba6129427e027c14fc8757303db122d3852ed798652403dbd4d2729baec9ab031363ec66de1c014bde29a787a0f1e928086561c003c8

  • C:\Windows\LOGS\DPX\setupact.log

    Filesize

    172KB

    MD5

    a5d41bb7501dfe74882a2ed913578774

    SHA1

    0fe99e24a7a4995bde2e5c192ca75523b32f01a8

    SHA256

    040f651d228e2d1c2b618e7afd795aea02c487b07f709d26ea5480201382c023

    SHA512

    631ee167a36cba068899f8f2b355a632919ee5762ecdc0fc02589018dfd1d196d0f990153d38476ad2b83d3fdd9d4983a7d27f181fe172ecc90c81f17bef7e52

  • C:\Windows\LOGS\DPX\setupact.log

    Filesize

    173KB

    MD5

    4d78aa841608495d398041d7da5691c5

    SHA1

    869a93065b7f713dad6b3c14ae6ce7d44cde2f07

    SHA256

    ad2f6903f7a84679c16432ccaa43fd9532e5f45889d466ef9ba22d05bb66e481

    SHA512

    966e17213b402f63c923ac8862fceba3d4a08583ca8cb38e6e2290cd338a4e0028ba33b3889ba693ef66ba2080379ddc3f05d255694167f34c2adec909d5a480

  • C:\Windows\LOGS\DPX\setupact.log

    Filesize

    174KB

    MD5

    cd3aaf7acfc831640153fe71bb0e35b8

    SHA1

    9f71f338a899506a855c3d7955ff8dbe8b08457e

    SHA256

    ef6114f7a3865f0eb1a5a4475f58f34a78d8fc0a48a5a14180f05c7cf89e201d

    SHA512

    91bf0db9e9820b14994e7490cc3d0fe64b4734552c3625d6514b3ce676f6ebbe5b877ded14fa8882f51b40be29b26232bc261bd5d8e04dd8a211c53852d51d34

  • C:\Windows\Logs\DPX\setupact.log

    Filesize

    172KB

    MD5

    d2c6b1f1adc2ec1f47b35c44b5692e16

    SHA1

    a0921f1373043383bec61dabc25765ecbe687e81

    SHA256

    c64a8003e066cd446d94504d9bd73c86be3e0fb80a5e8e40dda86ecf7ed09eea

    SHA512

    fbbdfd27fdecb4c889b295480187c256be7ac88bbd8f5378aa18abedb515708ec855e60428235b162dd989cb69e57beeb40cc99029ae56caacab44bfcef1b6f8

  • \??\c:\users\admin\appdata\local\temp\code\crc32.sec.zip

    Filesize

    29KB

    MD5

    9f79488a0f0832ba5621385bcdbe051e

    SHA1

    7464579e2ba57ffcbb54018141beadb3a075f244

    SHA256

    5c91cc63de571e770ba733fdfa3028544060085323733fce23201385016e5edf

    SHA512

    e8cb7ded1f169bf9c1c3fe408a1d7c2bbb5e6ef6351a9044830b2508cb70cfdb2546ab0f0ee38b731a1a3d046587ad04769c72d92cb0c53cfe07a61a79512881

  • \??\c:\users\admin\appdata\local\temp\inc\gui.inc.zip

    Filesize

    3KB

    MD5

    198419d819d8746e075c7c6dd4cc53ae

    SHA1

    abb10e479deb20ed13c153a241b8b9b70ad2fac2

    SHA256

    1f4d749d507f68ab6d970704dfffbcfc5d7a26f080adfe0541bfa5dda4b42669

    SHA512

    3057edd296a87a5b795a1190d6b7d849061d1e0075f5fd323de123e8229d039fe99b142ec30f7fb565b2f44aab2b235d1129872254f9a21e8c4283d35e3b2c6d

  • \??\c:\users\admin\appdata\local\temp\inc\lib\gdi32.lib.zip

    Filesize

    58KB

    MD5

    54860c094c7e7a8379665548641462d0

    SHA1

    9f1eaad74a62875d308f2a947946b756281210a9

    SHA256

    04b147dad1441b40fd76f6e2b6be5942bea7846740f0ed4f0cb307e032cb004c

    SHA512

    325793327e6137f8467e91e2f9a294ca3356e0885421cf8a9d2098bcddfd09af31a217de5c7a628d5f038aeb82dc9f4f68b9dd12cffcb12b2a763188926f40a6

  • \??\c:\users\admin\appdata\local\temp\sec.exe.zip

    Filesize

    93KB

    MD5

    4abd64e89f08637f7b5a09e664d5022f

    SHA1

    f0fb5640cbae362da5df7250d3b1fdf1f2c1f99e

    SHA256

    099681aa51fdd7bff43d36ad495e23e1403cfbb51869ca97b536a87fba8eb11c

    SHA512

    e5c7f749c4ae6d1282a224b2781f7a9e702fbbbdc8de150aa2042ee974d7f34f57cc99a0e6a10e363fbec2b69ab9a19037d2cb21ec181d49872d9e78eb4b173d

  • \??\c:\users\admin\appdata\local\temp\sec.ini.zip

    Filesize

    68KB

    MD5

    d501cd96aaba0649aacf8e36f4d23618

    SHA1

    ed87bf5ab1ffc115f82431ca82706e114742a572

    SHA256

    c5f4f979127e973f333b15b8bee09fa97125e25501aad7f2ad69568bd77e6d0d

    SHA512

    4a319ef1dc00f09a4566c324a318e87174fa96d6a322f59f4896db8048934236837493bf82abb1e8e45aacf2d4fb513c94daa2a1152b2a2bf6189dfa3834065e

  • \??\c:\users\admin\appdata\local\temp\sec1.exe.zip

    Filesize

    79KB

    MD5

    d085984d31845ee1481453980cb27330

    SHA1

    c807bf7fe564d8b0ce6c443fe5b03b74e849ed33

    SHA256

    80c2c7bba4315f170997d4f8fa4a977951dd3ca80ec0fcc7a8425d8eb429ce89

    SHA512

    31022f557c57aff90a86d3bc5f55ed71226b8d08f1bfb1b8d93b206f2e91883747653d813d5660b1dd1c99cd80af25d5e97e5242a680582e6021bffd5893895c

  • \??\c:\users\admin\appdata\local\temp\uplog.txt.zip

    Filesize

    9KB

    MD5

    3899bb128e5b294440bb8eecbcf5ac14

    SHA1

    a00b56c237e40ab7885bf694d98496de5623317c

    SHA256

    fae642716dfca375674fc5cae925f8156c0b65f1d146877525ebdff69fcdad02

    SHA512

    02f67ef5b9c8788dbaded76ed2b76680beed49cfb3c51ac2248ab4c1b266a66cba662e66fcfa8359c8a7e087f4f546215d7356ac32416d19acd05cdb281f7661

  • memory/768-383-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/768-385-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/768-395-0x0000000000400000-0x000000000044D000-memory.dmp

    Filesize

    308KB

  • memory/1404-133-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1404-388-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1404-143-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/1404-134-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB