Resubmissions

27-08-2023 15:40

230827-s3887aba84 10

27-08-2023 15:39

230827-s35k1acg91 10

27-08-2023 15:39

230827-s3w9macg9x 10

27-08-2023 12:17

230827-pf6b8shd87 10

27-08-2023 12:17

230827-pf3akshd86 10

27-08-2023 12:16

230827-pfzvfshd85 10

27-08-2023 12:16

230827-pfsfdabc8w 10

27-08-2023 12:16

230827-pflylahd84 10

27-08-2023 12:16

230827-pfgc4sbc8v 10

27-08-2023 12:15

230827-pfc1pahd83 10

Analysis

  • max time kernel
    1800s
  • max time network
    1795s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    27-08-2023 12:16

General

  • Target

    ExcenSC.exe

  • Size

    93KB

  • MD5

    caa7446c3e832a53be9336da30627217

  • SHA1

    fd6476edb0eada6f521ff9f22b58ea9ae5e1e957

  • SHA256

    35088ea25301db3dab3752a3ab02332083339080a3f8c8fd253b70607492aa26

  • SHA512

    330724395111ff77e43b172f62a30f22c7305125924d1ca9ac0977ad622794075ae5f07fc494ebb01ce886597436332d35dac711a7f3d228b47fe111da92f3d7

  • SSDEEP

    768:cY3yGL30YTXspgM0m2zGjpyDtdXWuxtXYLWhyXxrjEtCdnl2pi1Rz4Rk3ysGdpq3:eGD0AA0mT1mrWxL5jEwzGi1dDODqgS

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 3 IoCs
  • Drops startup file 2 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ExcenSC.exe
    "C:\Users\Admin\AppData\Local\Temp\ExcenSC.exe"
    1⤵
    • Drops startup file
    • Drops autorun.inf file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\ExcenSC.exe" "ExcenSC.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:2900
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\ExcenSC.exe"
      2⤵
      • Modifies Windows Firewall
      PID:2668
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\ExcenSC.exe" "ExcenSC.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • F:\Umbrella.flv.exe

    Filesize

    93KB

    MD5

    caa7446c3e832a53be9336da30627217

    SHA1

    fd6476edb0eada6f521ff9f22b58ea9ae5e1e957

    SHA256

    35088ea25301db3dab3752a3ab02332083339080a3f8c8fd253b70607492aa26

    SHA512

    330724395111ff77e43b172f62a30f22c7305125924d1ca9ac0977ad622794075ae5f07fc494ebb01ce886597436332d35dac711a7f3d228b47fe111da92f3d7

  • memory/2888-0-0x0000000074850000-0x0000000074DFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2888-1-0x0000000074850000-0x0000000074DFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2888-2-0x00000000001B0000-0x00000000001F0000-memory.dmp

    Filesize

    256KB

  • memory/2888-13-0x0000000074850000-0x0000000074DFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2888-14-0x0000000074850000-0x0000000074DFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2888-15-0x00000000001B0000-0x00000000001F0000-memory.dmp

    Filesize

    256KB