Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2023 01:20

General

  • Target

    iediagcmd.exe

  • Size

    503KB

  • MD5

    47848682b029e73d50db21b036234db3

  • SHA1

    cfb5e4cf260a4d8ca0daf135429332f7d27c93a3

  • SHA256

    879aebf76db4528f0f4747b38e0cb9ba66ad983c171fb54a4e548ff1c004e459

  • SHA512

    5052094b2033ae5b4a4334f7067086e2266bae5e34f8eef26535e70600c4162b48930ea5040a465511c10eb517ea128211b512fb5822b2b8ca4445498ef828cf

  • SSDEEP

    12288:vjQJGJ17jTmepq1Zi2HDG2YIwgj5rp21ZZ:LQJGJIW05YIww5tK

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Drops file in System32 directory 18 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 35 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\iediagcmd.exe
    "C:\Users\Admin\AppData\Local\Temp\iediagcmd.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\system32\dxdiag.exe
      "C:\Windows\system32\dxdiag.exe" /x C:\Users\Admin\AppData\Local\Temp\dxdiag.xml
      2⤵
      • Registers COM server for autorun
      • Drops file in System32 directory
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3628
    • C:\Windows\SYSTEM32\ipconfig.exe
      "ipconfig" /all
      2⤵
      • Gathers network information
      PID:1308
    • C:\Windows\SYSTEM32\route.exe
      "route" print
      2⤵
        PID:5032
      • C:\Windows\system32\netsh.exe
        "C:\Windows\system32\netsh.exe" in tcp show global
        2⤵
          PID:972
        • C:\Windows\system32\netsh.exe
          "C:\Windows\system32\netsh.exe" advfirewall firewall show rule name=all verbose
          2⤵
          • Modifies Windows Firewall
          PID:3000
        • C:\Windows\system32\netsh.exe
          "C:\Windows\system32\netsh.exe" winsock show catalog
          2⤵
            PID:4620
          • C:\Windows\SYSTEM32\makecab.exe
            "makecab.exe" /F "C:\Users\Admin\AppData\Local\Temp\iediag_makecab_directives.txt"
            2⤵
              PID:1372
          • C:\Windows\system32\rundll32.exe
            "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
            1⤵
              PID:3148
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k UnistackSvcGroup
              1⤵
                PID:4832

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

                Filesize

                16KB

                MD5

                b66f813296134a13e5c61fa640ec098c

                SHA1

                06b6d5a8842c11579b55ecda435e13fca6fde0f4

                SHA256

                985fd87202a9203b56f5582ac654171fbbc05a93239e9ec5a068c12db6984c7a

                SHA512

                df8e25c99a9f79bbff52a779e3a251d44931a7ce793a195bcba13aa0586d8a6e7cabd7c80dadd33783031bcfee62c715c4f8acb027cf4b0c4ce6f5efc555840a

              • C:\Users\Admin\AppData\Local\Temp\IEDiag.json

                Filesize

                26KB

                MD5

                4faf2d6a4418d2291b88f7a5f95aaf21

                SHA1

                18153191bf5a59c515a596a8c4ca2cbe07271a36

                SHA256

                2042b446befdaba3e8100cb82776e703ab046a2951705eafcf10198cf89109a3

                SHA512

                6ac35160ce3ac92f095286227c8f8a00303a498e7c43877ea859d83ce66df0cda354637d31717bf021b63bba5e815d4a0340e20d7544333b32b15bb98630823f

              • C:\Users\Admin\AppData\Local\Temp\IEDiag.xml

                Filesize

                2.6MB

                MD5

                3b32dd4edaa006f6dceabd19da1c906a

                SHA1

                1b9bd981e36a60ff3f54eb10c771b55816d5012c

                SHA256

                ead5e0ac3353eadda1acb891db881c9596cf7f0ea4227de7fef921b4ef079e16

                SHA512

                ecd168114464003c824b9bad7eebe176fd05bec9c88ab5818b59426c6902b704f2bdd7508a24209c3e899873d3389744c88521d42a64e1aeb927ad688dffac46

              • C:\Users\Admin\AppData\Local\Temp\dxdiag.xml

                Filesize

                172KB

                MD5

                11427623bc5d39438d4f40869cfa48b7

                SHA1

                d3810ef69bcd23a42f90abe74581fb3604318d5e

                SHA256

                c6acb50f05891b15dd8449e15fcd3650b9289d8160ea1270d3889206aca4df03

                SHA512

                8faf217435696726aeb5072ea7ec5af7b54d4cd42b48ee1b05eb3ab5be605b901aee21195083374bebaddd2f12b4e2eb0d2cac9b61a1453d61b82c9bdc07cc69

              • C:\Users\Admin\AppData\Local\Temp\iediag_makecab_directives.txt

                Filesize

                515B

                MD5

                14c148857af11ebcee263a2fb2b359ee

                SHA1

                710cb526ed69db7fdcc5da6b49241f70101e12fb

                SHA256

                810a37010bd4e6eed276310610dc4ebc7cc91535edf65e6ba6d9ed6edbe793ac

                SHA512

                d47ff7bdb40d518cf8daed410f29fea0f990457ed2da25ff2840a3bdcda77abe0b1b9948198a105a217fadbd4e4eed80fd0eb4338db7202892b9b4b910189e12

              • memory/1996-94-0x0000013E68190000-0x0000013E688E7000-memory.dmp

                Filesize

                7.3MB

              • memory/1996-40-0x0000013E68190000-0x0000013E688E7000-memory.dmp

                Filesize

                7.3MB

              • memory/1996-1-0x00007FFF03080000-0x00007FFF03B41000-memory.dmp

                Filesize

                10.8MB

              • memory/1996-95-0x00007FFF03080000-0x00007FFF03B41000-memory.dmp

                Filesize

                10.8MB

              • memory/1996-0-0x00007FF792C60000-0x00007FF792CE4000-memory.dmp

                Filesize

                528KB

              • memory/1996-2-0x0000013E67620000-0x0000013E67630000-memory.dmp

                Filesize

                64KB

              • memory/1996-3-0x0000013E67620000-0x0000013E67630000-memory.dmp

                Filesize

                64KB

              • memory/1996-4-0x0000013E67620000-0x0000013E67630000-memory.dmp

                Filesize

                64KB

              • memory/1996-64-0x0000013E67620000-0x0000013E67630000-memory.dmp

                Filesize

                64KB

              • memory/1996-63-0x0000013E68190000-0x0000013E688E7000-memory.dmp

                Filesize

                7.3MB

              • memory/1996-6-0x0000013E67620000-0x0000013E67630000-memory.dmp

                Filesize

                64KB

              • memory/1996-49-0x0000013E67620000-0x0000013E67630000-memory.dmp

                Filesize

                64KB

              • memory/1996-33-0x00007FFF03080000-0x00007FFF03B41000-memory.dmp

                Filesize

                10.8MB

              • memory/1996-34-0x0000013E67620000-0x0000013E67630000-memory.dmp

                Filesize

                64KB

              • memory/1996-5-0x0000013E68E00000-0x0000013E68FC2000-memory.dmp

                Filesize

                1.8MB

              • memory/1996-38-0x0000013E69500000-0x0000013E69A28000-memory.dmp

                Filesize

                5.2MB

              • memory/1996-37-0x0000013E67620000-0x0000013E67630000-memory.dmp

                Filesize

                64KB

              • memory/1996-39-0x0000013E67620000-0x0000013E67630000-memory.dmp

                Filesize

                64KB

              • memory/3628-19-0x000001BDDBAE0000-0x000001BDDBAE1000-memory.dmp

                Filesize

                4KB

              • memory/3628-7-0x000001BDDBAE0000-0x000001BDDBAE1000-memory.dmp

                Filesize

                4KB

              • memory/3628-16-0x000001BDDBAE0000-0x000001BDDBAE1000-memory.dmp

                Filesize

                4KB

              • memory/3628-17-0x000001BDDBAE0000-0x000001BDDBAE1000-memory.dmp

                Filesize

                4KB

              • memory/3628-15-0x000001BDDBAE0000-0x000001BDDBAE1000-memory.dmp

                Filesize

                4KB

              • memory/3628-13-0x000001BDDBAE0000-0x000001BDDBAE1000-memory.dmp

                Filesize

                4KB

              • memory/3628-14-0x000001BDDBAE0000-0x000001BDDBAE1000-memory.dmp

                Filesize

                4KB

              • memory/3628-8-0x000001BDDBAE0000-0x000001BDDBAE1000-memory.dmp

                Filesize

                4KB

              • memory/3628-9-0x000001BDDBAE0000-0x000001BDDBAE1000-memory.dmp

                Filesize

                4KB

              • memory/3628-18-0x000001BDDBAE0000-0x000001BDDBAE1000-memory.dmp

                Filesize

                4KB

              • memory/4832-112-0x000001EC25A40000-0x000001EC25A50000-memory.dmp

                Filesize

                64KB

              • memory/4832-129-0x000001EC2DF60000-0x000001EC2DF61000-memory.dmp

                Filesize

                4KB

              • memory/4832-130-0x000001EC2DF60000-0x000001EC2DF61000-memory.dmp

                Filesize

                4KB

              • memory/4832-131-0x000001EC2DF60000-0x000001EC2DF61000-memory.dmp

                Filesize

                4KB

              • memory/4832-132-0x000001EC2DF60000-0x000001EC2DF61000-memory.dmp

                Filesize

                4KB

              • memory/4832-133-0x000001EC2DF60000-0x000001EC2DF61000-memory.dmp

                Filesize

                4KB

              • memory/4832-134-0x000001EC2DF60000-0x000001EC2DF61000-memory.dmp

                Filesize

                4KB

              • memory/4832-135-0x000001EC2DF60000-0x000001EC2DF61000-memory.dmp

                Filesize

                4KB

              • memory/4832-136-0x000001EC2DF60000-0x000001EC2DF61000-memory.dmp

                Filesize

                4KB

              • memory/4832-128-0x000001EC2DF30000-0x000001EC2DF31000-memory.dmp

                Filesize

                4KB