Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2023 17:59

General

  • Target

    PO55453657675644bat_JC.exe

  • Size

    661KB

  • MD5

    a29c00073b51f8a2087cde792553b9ad

  • SHA1

    3a973a796798bcc13e0efd14e44315c4e4d70c0f

  • SHA256

    7bf1b9e7df8d0b024322706a790fb37d8ee58c6278f597154c902dc52bbc70ca

  • SHA512

    24b142dbf99bd03a58dfca4c0e5cc3157981609202a38b58d1f8d656b40f562e7cca45b2543f4fef4782b564f9a72aaecb52e0646e89a44872f624f30de1d4e1

  • SSDEEP

    12288:hiMC/jox7gnCnXOUiBVa03DysP+qTkQ3fRVWV9v0L36ySrrl5/uNul3:eLoxknUaxDdP+mv3kJbdFuNI

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO55453657675644bat_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\PO55453657675644bat_JC.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zBuDDbPRtfNDcv.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2544
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zBuDDbPRtfNDcv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp392A.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2532
    • C:\Users\Admin\AppData\Local\Temp\PO55453657675644bat_JC.exe
      "C:\Users\Admin\AppData\Local\Temp\PO55453657675644bat_JC.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp392A.tmp

    Filesize

    1KB

    MD5

    8d629846eed2d9c132ca55baa75902a9

    SHA1

    defbb7106829bdd5a3d67aa99d8187f10f1c6384

    SHA256

    781479166fe374801bc667055f0b4cd22028d52aa8d788aca61ababf39401f53

    SHA512

    553b3dd352eea59658c126c8e69e01fba7f95be9003d97b6945b1c12cb3f12d1632fac5b8da7ccb0bec79a172f7d8a788cca0198ad82ab3de2f6aebeeb823b0e

  • memory/2324-3-0x00000000004F0000-0x0000000000508000-memory.dmp

    Filesize

    96KB

  • memory/2324-2-0x0000000004E00000-0x0000000004E40000-memory.dmp

    Filesize

    256KB

  • memory/2324-1-0x0000000074680000-0x0000000074D6E000-memory.dmp

    Filesize

    6.9MB

  • memory/2324-0-0x00000000012B0000-0x000000000135C000-memory.dmp

    Filesize

    688KB

  • memory/2324-4-0x0000000074680000-0x0000000074D6E000-memory.dmp

    Filesize

    6.9MB

  • memory/2324-5-0x0000000004E00000-0x0000000004E40000-memory.dmp

    Filesize

    256KB

  • memory/2324-6-0x00000000004D0000-0x00000000004E0000-memory.dmp

    Filesize

    64KB

  • memory/2324-7-0x0000000005BA0000-0x0000000005C1A000-memory.dmp

    Filesize

    488KB

  • memory/2324-29-0x0000000074680000-0x0000000074D6E000-memory.dmp

    Filesize

    6.9MB

  • memory/2524-21-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2524-32-0x0000000004D10000-0x0000000004D50000-memory.dmp

    Filesize

    256KB

  • memory/2524-17-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2524-25-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2524-23-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2524-27-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2524-15-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2524-30-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2524-39-0x0000000073380000-0x0000000073A6E000-memory.dmp

    Filesize

    6.9MB

  • memory/2524-19-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2524-38-0x0000000004D10000-0x0000000004D50000-memory.dmp

    Filesize

    256KB

  • memory/2524-35-0x0000000073380000-0x0000000073A6E000-memory.dmp

    Filesize

    6.9MB

  • memory/2544-34-0x000000006EA50000-0x000000006EFFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2544-36-0x0000000002210000-0x0000000002250000-memory.dmp

    Filesize

    256KB

  • memory/2544-37-0x000000006EA50000-0x000000006EFFB000-memory.dmp

    Filesize

    5.7MB

  • memory/2544-33-0x0000000002210000-0x0000000002250000-memory.dmp

    Filesize

    256KB

  • memory/2544-31-0x000000006EA50000-0x000000006EFFB000-memory.dmp

    Filesize

    5.7MB