Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27/08/2023, 05:22

General

  • Target

    3be843f5b1c19c435fcaeeead1c16ba08636c63e29fcc4208967af7059c33c00.exe

  • Size

    3.3MB

  • MD5

    be2ff5df60ec9a7368ef353495a96706

  • SHA1

    8437d4c3d19ea6280ce9598cba1083d9b55febbc

  • SHA256

    3be843f5b1c19c435fcaeeead1c16ba08636c63e29fcc4208967af7059c33c00

  • SHA512

    faefbeaa1c2aad1f9c1cf9db924382a43197cdca466798fe7084d4f15614562ac3717501f0c2c5052c4b797569fa2f6c1b4d751ae911c6cfd9d845eaf1a5efa4

  • SSDEEP

    98304:BzdNGU3MREuVKATGF89NOR8bsU8Pe256gR:9dg3VKHF89NYp59R

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3be843f5b1c19c435fcaeeead1c16ba08636c63e29fcc4208967af7059c33c00.exe
    "C:\Users\Admin\AppData\Local\Temp\3be843f5b1c19c435fcaeeead1c16ba08636c63e29fcc4208967af7059c33c00.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Users\Admin\AppData\Local\Temp\3be843f5b1c19c435fcaeeead1c16ba08636c63e29fcc4208967af7059c33c00.exe
      PECMD**pecmd-cmd* PUTF "C:\Users\Admin\AppData\Local\Temp\~~6330182060289173698.tmp.exe",,"C:\Users\Admin\AppData\Local\Temp\3be843f5b1c19c435fcaeeead1c16ba08636c63e29fcc4208967af7059c33c00.exe""#102|SCRIPT"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1636
    • C:\Users\Admin\AppData\Local\Temp\~~6330182060289173698.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\~~6330182060289173698.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2136
    • C:\Users\Admin\AppData\Local\Temp\3be843f5b1c19c435fcaeeead1c16ba08636c63e29fcc4208967af7059c33c00.exe
      PECMD**pecmd-cmd* EXEC -wd:C: -hide cmd /c "C:\Users\Admin\AppData\Local\Temp\~727029293154719193.cmd"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\system32\cmd.exe
        cmd /c "C:\Users\Admin\AppData\Local\Temp\~727029293154719193.cmd"
        3⤵
          PID:2980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~727029293154719193.cmd

      Filesize

      404B

      MD5

      30eae6364930b3a47a969e2d19425d0b

      SHA1

      65e09986f5bb81cf481eb5b118ee608d28a0c72a

      SHA256

      ccfeb295e0d4407de3385bde24f32c2ac97ee78d933c8cdfef2c8dd53b041b6d

      SHA512

      bdbcd95893c8f20327eed28de83a01808f779b4b81112c979d6066f0ddb5570bed8cddc05853edc62f526a805cbe6b82abf2213f4781e3045b20b5bae4416d34

    • C:\Users\Admin\AppData\Local\Temp\~727029293154719193.cmd

      Filesize

      404B

      MD5

      30eae6364930b3a47a969e2d19425d0b

      SHA1

      65e09986f5bb81cf481eb5b118ee608d28a0c72a

      SHA256

      ccfeb295e0d4407de3385bde24f32c2ac97ee78d933c8cdfef2c8dd53b041b6d

      SHA512

      bdbcd95893c8f20327eed28de83a01808f779b4b81112c979d6066f0ddb5570bed8cddc05853edc62f526a805cbe6b82abf2213f4781e3045b20b5bae4416d34

    • C:\Users\Admin\AppData\Local\Temp\~~6330182060289173698.tmp.exe

      Filesize

      2.7MB

      MD5

      02cdbd6d8bece8e7da54b567a3b7de8a

      SHA1

      23706ddfddd04c146ff7a95aeae3b6e1f0758944

      SHA256

      6499bc13f9bec48c6be9e076117a42a488def3bb488e1768257ef8f1a49b48de

      SHA512

      dc1c29466cb24fb7dff98b74058f6d0eddc07245b05d0d450e869440d91f45e30001e6d626421df3d6cd687ea9148d21cec870825186e413205439b836e7eaec

    • C:\Users\Admin\AppData\Local\Temp\~~6330182060289173698.tmp.exe

      Filesize

      2.7MB

      MD5

      02cdbd6d8bece8e7da54b567a3b7de8a

      SHA1

      23706ddfddd04c146ff7a95aeae3b6e1f0758944

      SHA256

      6499bc13f9bec48c6be9e076117a42a488def3bb488e1768257ef8f1a49b48de

      SHA512

      dc1c29466cb24fb7dff98b74058f6d0eddc07245b05d0d450e869440d91f45e30001e6d626421df3d6cd687ea9148d21cec870825186e413205439b836e7eaec

    • \Users\Admin\AppData\Local\Temp\~~6330182060289173698.tmp.exe

      Filesize

      2.7MB

      MD5

      02cdbd6d8bece8e7da54b567a3b7de8a

      SHA1

      23706ddfddd04c146ff7a95aeae3b6e1f0758944

      SHA256

      6499bc13f9bec48c6be9e076117a42a488def3bb488e1768257ef8f1a49b48de

      SHA512

      dc1c29466cb24fb7dff98b74058f6d0eddc07245b05d0d450e869440d91f45e30001e6d626421df3d6cd687ea9148d21cec870825186e413205439b836e7eaec

    • memory/1636-4-0x0000000000400000-0x00000000007B4000-memory.dmp

      Filesize

      3.7MB

    • memory/1636-1-0x0000000000400000-0x00000000007B4000-memory.dmp

      Filesize

      3.7MB

    • memory/1640-0-0x0000000000400000-0x00000000007B4000-memory.dmp

      Filesize

      3.7MB

    • memory/1640-2-0x0000000002510000-0x00000000028C4000-memory.dmp

      Filesize

      3.7MB

    • memory/1640-27-0x0000000000400000-0x00000000007B4000-memory.dmp

      Filesize

      3.7MB

    • memory/1640-28-0x0000000000400000-0x00000000007B4000-memory.dmp

      Filesize

      3.7MB

    • memory/2796-30-0x0000000000400000-0x00000000007B4000-memory.dmp

      Filesize

      3.7MB

    • memory/2796-29-0x0000000000400000-0x00000000007B4000-memory.dmp

      Filesize

      3.7MB