Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 03:07

General

  • Target

    e9e53ecc97b7ebe3f200c1bf2de96290d80f2b1900841c61e32c731c0b9d95c7.exe

  • Size

    1.5MB

  • MD5

    4429a2f472f0b0d4b761ca18da3a3236

  • SHA1

    093040669f59a4e784545db7425c2a66125f5887

  • SHA256

    e9e53ecc97b7ebe3f200c1bf2de96290d80f2b1900841c61e32c731c0b9d95c7

  • SHA512

    dacc5b65afe4145414918ee92e76ac6ed8f2e65654a4b65f398052e868e8a7aa097894d1151746b9087c583625519f9145a31a16db34dd0b80586376bc5f4121

  • SSDEEP

    49152:35qAFJFaDlz2h+TEtIHtQZsPvfvCoz14V82RvCG:pT7FaDlzuctIsPvJ4a2Rv

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9e53ecc97b7ebe3f200c1bf2de96290d80f2b1900841c61e32c731c0b9d95c7.exe
    "C:\Users\Admin\AppData\Local\Temp\e9e53ecc97b7ebe3f200c1bf2de96290d80f2b1900841c61e32c731c0b9d95c7.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c md C:\ProgramData\oxnqnizqkietxydhghgbfzjrcpiqbfwsvfhhzcoeppuqijykoz
      2⤵
        PID:4284
      • C:\Users\Admin\AppData\Local\Temp\e9e53ecc97b7ebe3f200c1bf2de96290d80f2b1900841c61e32c731c0b9d95c7.exe
        GG433A5C50726F6772616D446174615C6F786E716E697A716B6965747879646867686762667A6A726370697162667773766668687A636F6570707571696A796B6F7A5C797A796D6665677362617372746D76696B69737861656E7A2E657865
        2⤵
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3104
        • C:\Users\Admin\AppData\Local\Temp\e9e53ecc97b7ebe3f200c1bf2de96290d80f2b1900841c61e32c731c0b9d95c7.exe
          JJ433A5C50726F6772616D446174615C6F786E716E697A716B6965747879646867686762667A6A726370697162667773766668687A636F6570707571696A796B6F7A5C797A796D6665677362617372746D76696B69737861656E7A2E657865
          3⤵
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c start C:\ProgramData\oxnqnizqkietxydhghgbfzjrcpiqbfwsvfhhzcoeppuqijykoz\yzymfegsbasrtmvikisxaenz.exe
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4092
            • C:\ProgramData\oxnqnizqkietxydhghgbfzjrcpiqbfwsvfhhzcoeppuqijykoz\yzymfegsbasrtmvikisxaenz.exe
              C:\ProgramData\oxnqnizqkietxydhghgbfzjrcpiqbfwsvfhhzcoeppuqijykoz\yzymfegsbasrtmvikisxaenz.exe
              5⤵
              • Adds policy Run key to start application
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:1596

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\oxnqnizqkietxydhghgbfzjrcpiqbfwsvfhhzcoeppuqijykoz\MSVCR100.dll

      Filesize

      755KB

      MD5

      bf38660a9125935658cfa3e53fdc7d65

      SHA1

      0b51fb415ec89848f339f8989d323bea722bfd70

      SHA256

      60c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa

      SHA512

      25f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1

    • C:\ProgramData\oxnqnizqkietxydhghgbfzjrcpiqbfwsvfhhzcoeppuqijykoz\jli.dll

      Filesize

      552KB

      MD5

      e04ef359ef8be6a8deeab8db30337fda

      SHA1

      7f27a8bfa000e520903dad18459bed45dac5ef69

      SHA256

      42edd59f521fadb2ef4844da74e5aaea899ea174f2f083628b1751733e0f2cf4

      SHA512

      26356b8866f946dd8d8ba1d11936ea914e22d97288ad78c5f4615114f11a64d98bee60d8058108936b838ca6e89353842608d0afd255ecb08353dfaef7e2438f

    • C:\ProgramData\oxnqnizqkietxydhghgbfzjrcpiqbfwsvfhhzcoeppuqijykoz\jli.dll

      Filesize

      552KB

      MD5

      e04ef359ef8be6a8deeab8db30337fda

      SHA1

      7f27a8bfa000e520903dad18459bed45dac5ef69

      SHA256

      42edd59f521fadb2ef4844da74e5aaea899ea174f2f083628b1751733e0f2cf4

      SHA512

      26356b8866f946dd8d8ba1d11936ea914e22d97288ad78c5f4615114f11a64d98bee60d8058108936b838ca6e89353842608d0afd255ecb08353dfaef7e2438f

    • C:\ProgramData\oxnqnizqkietxydhghgbfzjrcpiqbfwsvfhhzcoeppuqijykoz\msvcr100.dll

      Filesize

      755KB

      MD5

      bf38660a9125935658cfa3e53fdc7d65

      SHA1

      0b51fb415ec89848f339f8989d323bea722bfd70

      SHA256

      60c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa

      SHA512

      25f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1

    • C:\ProgramData\oxnqnizqkietxydhghgbfzjrcpiqbfwsvfhhzcoeppuqijykoz\yzymfegsbasrtmvikisxaenz.exe

      Filesize

      16KB

      MD5

      973b4b2658796840ad6ff9ac1cb21383

      SHA1

      2ae4808a1d7e450707a9f928ea13cd73e5040431

      SHA256

      f671045566c60930dc459aa30e2bb38f25525e670bf72f7b69c1f918ae3d9565

      SHA512

      42e313fae2f84c6ecc7b5c2c4178bcbcf3043fd239d9b05f5614b64e2d8841a7fe54a0786c1b5752bb1b54079b9873d6ade63e7b00cb4118a007d3d0360d6b4c

    • C:\ProgramData\oxnqnizqkietxydhghgbfzjrcpiqbfwsvfhhzcoeppuqijykoz\yzymfegsbasrtmvikisxaenz.exe

      Filesize

      16KB

      MD5

      973b4b2658796840ad6ff9ac1cb21383

      SHA1

      2ae4808a1d7e450707a9f928ea13cd73e5040431

      SHA256

      f671045566c60930dc459aa30e2bb38f25525e670bf72f7b69c1f918ae3d9565

      SHA512

      42e313fae2f84c6ecc7b5c2c4178bcbcf3043fd239d9b05f5614b64e2d8841a7fe54a0786c1b5752bb1b54079b9873d6ade63e7b00cb4118a007d3d0360d6b4c

    • C:\ProgramData\oxnqnizqkietxydhghgbfzjrcpiqbfwsvfhhzcoeppuqijykoz\yzymfegsbasrtmvikisxaenz.txt

      Filesize

      252B

      MD5

      a6afaf7e7453d584901a54f32f56526f

      SHA1

      edb832a65d2c4dc5f36eb5c81263bad28c6d1057

      SHA256

      1a869302de44c7618c0bae3a7ae2e3282298fc949d2c61015112135a419e122d

      SHA512

      83d9fc94f49b6300a667a91d74b699c8a6e3f0f76de6d1f3377702daeeb35aaab9126c8dc2df5fb81862f69b94d8af330e5448bc4593f0cf2412c8008e4b11dd

    • memory/1596-12-0x0000000002A60000-0x0000000002B47000-memory.dmp

      Filesize

      924KB

    • memory/1596-28-0x0000000004540000-0x0000000004592000-memory.dmp

      Filesize

      328KB

    • memory/1596-14-0x0000000002A60000-0x0000000002B47000-memory.dmp

      Filesize

      924KB

    • memory/1596-15-0x0000000002A60000-0x0000000002B47000-memory.dmp

      Filesize

      924KB

    • memory/1596-16-0x0000000003720000-0x0000000003931000-memory.dmp

      Filesize

      2.1MB

    • memory/1596-21-0x0000000003DB0000-0x0000000003E9B000-memory.dmp

      Filesize

      940KB

    • memory/1596-20-0x0000000003A40000-0x0000000003A96000-memory.dmp

      Filesize

      344KB

    • memory/1596-10-0x0000000002890000-0x0000000002891000-memory.dmp

      Filesize

      4KB

    • memory/1596-24-0x0000000003EA0000-0x0000000003F39000-memory.dmp

      Filesize

      612KB

    • memory/1596-25-0x00000000043C0000-0x0000000004535000-memory.dmp

      Filesize

      1.5MB

    • memory/1596-26-0x00000000043C0000-0x0000000004535000-memory.dmp

      Filesize

      1.5MB

    • memory/1596-11-0x0000000002A60000-0x0000000002B47000-memory.dmp

      Filesize

      924KB

    • memory/1596-29-0x0000000003720000-0x0000000003931000-memory.dmp

      Filesize

      2.1MB

    • memory/1596-30-0x0000000003A40000-0x0000000003A96000-memory.dmp

      Filesize

      344KB

    • memory/1596-31-0x0000000003DB0000-0x0000000003E9B000-memory.dmp

      Filesize

      940KB

    • memory/1596-33-0x0000000003960000-0x0000000003961000-memory.dmp

      Filesize

      4KB

    • memory/1596-32-0x0000000003970000-0x0000000003971000-memory.dmp

      Filesize

      4KB

    • memory/1596-34-0x0000000003720000-0x0000000003931000-memory.dmp

      Filesize

      2.1MB

    • memory/1596-35-0x0000000004540000-0x0000000004592000-memory.dmp

      Filesize

      328KB

    • memory/1596-36-0x0000000003EA0000-0x0000000003F39000-memory.dmp

      Filesize

      612KB

    • memory/1596-37-0x00000000043C0000-0x0000000004535000-memory.dmp

      Filesize

      1.5MB

    • memory/1596-38-0x0000000004540000-0x0000000004592000-memory.dmp

      Filesize

      328KB