Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2023, 06:29

General

  • Target

    b6f3114f7476416baa53a21041f565d2.exe

  • Size

    9.6MB

  • MD5

    b6f3114f7476416baa53a21041f565d2

  • SHA1

    cc7d62a1e81036540bb8bef48725f7387b8283d5

  • SHA256

    36d25f51cbdebbc0c4b68243126b7be96d0d041e14a950d055d883a83ea864a2

  • SHA512

    ca237e472f60fa47e5e1bc1d86133a4afda2d2a88de468da2b46ef753e3090a62310c2d17aadd45184bb352bf8867f49b0f1ca225c86c7de81e37c9597b679ca

  • SSDEEP

    196608:qI/fq6jdcTYAXNFPLeBzM/YbRms1mOOQaGg9fF0pW1gQlj32w2MI3XdppSpCE:B5jdc8oNFPLe5MS9gjQRy0pqgQlaZXLi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 15 IoCs
  • Detects Pyinstaller 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Delays execution with timeout.exe 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6f3114f7476416baa53a21041f565d2.exe
    "C:\Users\Admin\AppData\Local\Temp\b6f3114f7476416baa53a21041f565d2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -DisableRealtimeMonitoring $true
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2644
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\ProgramData\Microsoft\Windows\msreg
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2960
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\ProgramData\Microsoft\Windows\msreg\run.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\SysWOW64\timeout.exe
        TIMEOUT /T 1 /NOBREAK
        3⤵
        • Delays execution with timeout.exe
        PID:2128
      • C:\ProgramData\Microsoft\Windows\msreg\Wmiic.exe
        "C:\ProgramData\Microsoft\Windows\msreg\wmiic.exe" install Distribution_protocol msreg.exe
        3⤵
        • Executes dropped EXE
        PID:1236
      • C:\Windows\SysWOW64\timeout.exe
        TIMEOUT /T 1 /NOBREAK
        3⤵
        • Delays execution with timeout.exe
        PID:772
      • C:\ProgramData\Microsoft\Windows\msreg\Wmiic.exe
        "C:\ProgramData\Microsoft\Windows\msreg\wmiic.exe" start Distribution_protocol
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 1488 -s 196
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1848
      • C:\Windows\SysWOW64\timeout.exe
        TIMEOUT /T 2 /NOBREAK
        3⤵
        • Delays execution with timeout.exe
        PID:1996
      • C:\Windows\SysWOW64\net.exe
        net start Distribution_protocol
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1064
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 start Distribution_protocol
          4⤵
            PID:2612
    • C:\ProgramData\Microsoft\Windows\msreg\Wmiic.exe
      C:\ProgramData\Microsoft\Windows\msreg\Wmiic.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\ProgramData\Microsoft\Windows\msreg\msreg.exe
        "msreg.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1692
        • C:\ProgramData\Microsoft\Windows\msreg\msreg.exe
          "msreg.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1044

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • C:\ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • C:\ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • C:\ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • C:\ProgramData\Microsoft\Windows\msreg\msreg.exe

      Filesize

      9.5MB

      MD5

      e74067d17b640179e2e28489b94b0123

      SHA1

      3d7e0ac8976de905beffde164e089cfc48d592bd

      SHA256

      ee19cffb3e7de31afef6e2e6a97cba4a3e4f2effc228a88eff8069ae9a7f023c

      SHA512

      09cb6df026acc469fcbb8b66c67614ed3a9b19e5529f5a2cfff245ce0db9f14a4f0569e497b0056347bac00b70baf600242a8cb43010b85526f8bfa67fc2b935

    • C:\ProgramData\Microsoft\Windows\msreg\msreg.exe

      Filesize

      9.5MB

      MD5

      e74067d17b640179e2e28489b94b0123

      SHA1

      3d7e0ac8976de905beffde164e089cfc48d592bd

      SHA256

      ee19cffb3e7de31afef6e2e6a97cba4a3e4f2effc228a88eff8069ae9a7f023c

      SHA512

      09cb6df026acc469fcbb8b66c67614ed3a9b19e5529f5a2cfff245ce0db9f14a4f0569e497b0056347bac00b70baf600242a8cb43010b85526f8bfa67fc2b935

    • C:\ProgramData\Microsoft\Windows\msreg\msreg.exe

      Filesize

      9.5MB

      MD5

      e74067d17b640179e2e28489b94b0123

      SHA1

      3d7e0ac8976de905beffde164e089cfc48d592bd

      SHA256

      ee19cffb3e7de31afef6e2e6a97cba4a3e4f2effc228a88eff8069ae9a7f023c

      SHA512

      09cb6df026acc469fcbb8b66c67614ed3a9b19e5529f5a2cfff245ce0db9f14a4f0569e497b0056347bac00b70baf600242a8cb43010b85526f8bfa67fc2b935

    • C:\ProgramData\Microsoft\Windows\msreg\run.bat

      Filesize

      361B

      MD5

      bb1bd54915cd0d6cad88493fb42e2cf8

      SHA1

      4981b74a59593fc4e5b466871170ea87a3c93020

      SHA256

      a5b5061a92bc4b0c8fcfa7269c5575b60884a24e9832bb03c9033469f306cd82

      SHA512

      baba97c30d6e0e3d92f36992ee7d3c41db0bdebfc964671253ec2a9b7157f738077bdd83a3a48add0f8617ff015b710029d0b91f9d318cb44354cbfc600508ce

    • C:\ProgramData\Microsoft\Windows\msreg\run.bat

      Filesize

      361B

      MD5

      bb1bd54915cd0d6cad88493fb42e2cf8

      SHA1

      4981b74a59593fc4e5b466871170ea87a3c93020

      SHA256

      a5b5061a92bc4b0c8fcfa7269c5575b60884a24e9832bb03c9033469f306cd82

      SHA512

      baba97c30d6e0e3d92f36992ee7d3c41db0bdebfc964671253ec2a9b7157f738077bdd83a3a48add0f8617ff015b710029d0b91f9d318cb44354cbfc600508ce

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1KC8371BAW7PQDE7AEFM.temp

      Filesize

      7KB

      MD5

      f6b7cc89e86948800f3a01dbf7fbf7d9

      SHA1

      a09642f7596e00459f7e73f68c47de79764f07d3

      SHA256

      2c3e7e022091ce3a93bb5d4cf6bf94c9d47d750c1b0dbbc4b43df686a0a11159

      SHA512

      3ad6a0ae371301dbe5649c52d1ce744e7a17a53196780bf359c6ddbad7a29201dd933cc34410e742fd4f5da70f2d523073e64a750c6e4f242fb70144a1e46d20

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      f6b7cc89e86948800f3a01dbf7fbf7d9

      SHA1

      a09642f7596e00459f7e73f68c47de79764f07d3

      SHA256

      2c3e7e022091ce3a93bb5d4cf6bf94c9d47d750c1b0dbbc4b43df686a0a11159

      SHA512

      3ad6a0ae371301dbe5649c52d1ce744e7a17a53196780bf359c6ddbad7a29201dd933cc34410e742fd4f5da70f2d523073e64a750c6e4f242fb70144a1e46d20

    • C:\Windows\TEMP\_MEI16922\python310.dll

      Filesize

      4.3MB

      MD5

      342ba224fe440b585db4e9d2fc9f86cd

      SHA1

      bfa3d380231166f7c2603ca89a984a5cad9752ab

      SHA256

      cdb8158dcf4f10517bd73e1334fc354fd98180d4455f29e3df2b0aa699fa2432

      SHA512

      daa990ff3770a39b778f672f2596ab4050bff9b16bb2222e5712327df82d18f39ac5100e3b592a5db9e88302e6e94c06881fbf61431e7670ff287f7f222254c1

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\Wmiic.exe

      Filesize

      365KB

      MD5

      a18bfe142f059fdb5c041a310339d4fd

      SHA1

      8ab2b0ddc897603344de8f1d4cc01af118a0c543

      SHA256

      644c9745d1d2f679db73fcb717dd37e180e19d5b0fc74575e4cefe4f543f2768

      SHA512

      c30d46781b17c4bb0610d3af4b5acc223394d02f9fbb1fbb55811ae2efe49fd29a7e9626737c4b24194c73c58fe1b577a858559a7e58d93c3660ac680f19eaf8

    • \ProgramData\Microsoft\Windows\msreg\msreg.exe

      Filesize

      9.5MB

      MD5

      e74067d17b640179e2e28489b94b0123

      SHA1

      3d7e0ac8976de905beffde164e089cfc48d592bd

      SHA256

      ee19cffb3e7de31afef6e2e6a97cba4a3e4f2effc228a88eff8069ae9a7f023c

      SHA512

      09cb6df026acc469fcbb8b66c67614ed3a9b19e5529f5a2cfff245ce0db9f14a4f0569e497b0056347bac00b70baf600242a8cb43010b85526f8bfa67fc2b935

    • \Windows\Temp\_MEI16922\python310.dll

      Filesize

      4.3MB

      MD5

      342ba224fe440b585db4e9d2fc9f86cd

      SHA1

      bfa3d380231166f7c2603ca89a984a5cad9752ab

      SHA256

      cdb8158dcf4f10517bd73e1334fc354fd98180d4455f29e3df2b0aa699fa2432

      SHA512

      daa990ff3770a39b778f672f2596ab4050bff9b16bb2222e5712327df82d18f39ac5100e3b592a5db9e88302e6e94c06881fbf61431e7670ff287f7f222254c1

    • memory/2644-59-0x0000000074040000-0x00000000745EB000-memory.dmp

      Filesize

      5.7MB

    • memory/2644-55-0x0000000074040000-0x00000000745EB000-memory.dmp

      Filesize

      5.7MB

    • memory/2644-56-0x0000000074040000-0x00000000745EB000-memory.dmp

      Filesize

      5.7MB

    • memory/2644-57-0x0000000002710000-0x0000000002750000-memory.dmp

      Filesize

      256KB

    • memory/2644-58-0x0000000002710000-0x0000000002750000-memory.dmp

      Filesize

      256KB

    • memory/2960-68-0x00000000027F0000-0x0000000002830000-memory.dmp

      Filesize

      256KB

    • memory/2960-65-0x0000000073610000-0x0000000073BBB000-memory.dmp

      Filesize

      5.7MB

    • memory/2960-66-0x0000000073610000-0x0000000073BBB000-memory.dmp

      Filesize

      5.7MB

    • memory/2960-67-0x00000000027F0000-0x0000000002830000-memory.dmp

      Filesize

      256KB

    • memory/2960-69-0x00000000027F0000-0x0000000002830000-memory.dmp

      Filesize

      256KB

    • memory/2960-70-0x0000000073610000-0x0000000073BBB000-memory.dmp

      Filesize

      5.7MB