Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 03:13

General

  • Target

    ef03807c9e429c2271f77f4f4cc1cd538605641dcd85b2a5b55de55524c5efe2.exe

  • Size

    1.4MB

  • MD5

    e23232a03ccf295f531a9a81b129c2c0

  • SHA1

    5977dc3b4220e8dcfee8933a3d1414dfdb122d29

  • SHA256

    ef03807c9e429c2271f77f4f4cc1cd538605641dcd85b2a5b55de55524c5efe2

  • SHA512

    9977599999eff2af8af99cf4fc81a36221fc847a96ca3c6db9a1cd32976ed8bafa2ec47e0306f2194f7c5771d65456a37b95fd3de52c178a930b093e2934e207

  • SSDEEP

    24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef03807c9e429c2271f77f4f4cc1cd538605641dcd85b2a5b55de55524c5efe2.exe
    "C:\Users\Admin\AppData\Local\Temp\ef03807c9e429c2271f77f4f4cc1cd538605641dcd85b2a5b55de55524c5efe2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\ratt.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:832
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c nslookup myip.opendns.com. resolver1.opendns.com
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup myip.opendns.com. resolver1.opendns.com
          4⤵
            PID:3048
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic ComputerSystem get Domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2616
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic ComputerSystem get Domain
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2712
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1960
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2624
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2560
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "$Env:SystemDrive\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2576
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionProcess "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2180
        • C:\Users\Admin\AppData\Local\Temp\7z.exe
          7z.exe x -o"C:\Users\Admin\AppData\Local\Temp" -y ratt.7z
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1692
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -executionpolicy RemoteSigned -WindowStyle Hidden -file Add.ps1
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2812
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=in action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:1352

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7z.dll

      Filesize

      328KB

      MD5

      15bbbe562f9be3e5dcbb834e635cc231

      SHA1

      7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

      SHA256

      ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

      SHA512

      769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

    • C:\Users\Admin\AppData\Local\Temp\7z.exe

      Filesize

      71KB

      MD5

      8ba2e41b330ae9356e62eb63514cf82e

      SHA1

      8dc266467a5a0d587ed0181d4344581ef4ff30b2

      SHA256

      ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

      SHA512

      2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

    • C:\Users\Admin\AppData\Local\Temp\7z.exe

      Filesize

      71KB

      MD5

      8ba2e41b330ae9356e62eb63514cf82e

      SHA1

      8dc266467a5a0d587ed0181d4344581ef4ff30b2

      SHA256

      ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

      SHA512

      2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

    • C:\Users\Admin\AppData\Local\Temp\Add.ps1

      Filesize

      1KB

      MD5

      0df43097e0f0acd04d9e17fb43d618b9

      SHA1

      69b3ade12cb228393a93624e65f41604a17c83b6

      SHA256

      c8e4a63337a25f55f75ad10ab2b420d716bad4b35a2044fd39dcd5936419d873

      SHA512

      01ae71dd2ee040baad6f4b9afcfbaeca2b9f6cc7d60ade5de637238d65c17d74292734666f4ae6b533f6bf1007c46387d8e690d97c3b7a535bcd6f216e70c4fb

    • C:\Users\Admin\AppData\Local\Temp\ratt.7z

      Filesize

      693KB

      MD5

      7de6fdf3629c73bf0c29a96fa23ae055

      SHA1

      dcb37f6d43977601c6460b17387a89b9e4c0609a

      SHA256

      069979bfb2aefe3cac239fe4f2477672eb75b90c9853fb67b2ac1438f2ec44ff

      SHA512

      d1ef2299aacf429572fd6df185009960e601e49126f080fdced26ec407e5db86eaa902e474635464aac146b7de286667a398f2c5e46c4a821dad2579bfb3acf8

    • C:\Users\Admin\AppData\Local\Temp\ratt.bat

      Filesize

      1KB

      MD5

      7ea1fec84d76294d9256ae3dca7676b2

      SHA1

      1e335451d1cbb6951bc77bf75430f4d983491342

      SHA256

      9a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940

      SHA512

      ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317

    • C:\Users\Admin\AppData\Local\Temp\ratt.bat

      Filesize

      1KB

      MD5

      7ea1fec84d76294d9256ae3dca7676b2

      SHA1

      1e335451d1cbb6951bc77bf75430f4d983491342

      SHA256

      9a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940

      SHA512

      ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317

    • C:\Users\Admin\AppData\Local\Temp\ratt.exe

      Filesize

      745.1MB

      MD5

      be788bb3680cf3809d9678ee6f7ba321

      SHA1

      499f01d5f654f83e172004dcc03f99abdd251734

      SHA256

      03a17a2b669f72df082569ea477977d824796da3b6b7a8d0e6f91f2629ef406b

      SHA512

      83c0b885740a57b84b2c909d0d6bb25baaa49d62499773030b59058325f37a5fcf39a1cd59ef9c229ca7289af7250034f6652e449625b67c2d260b285ddb9a8e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\562AA1FBB20R7SKQXBP9.temp

      Filesize

      7KB

      MD5

      0ded9d5de316469d64d39cc63368f159

      SHA1

      bd5f4d3da2973fc6f0466efe72d258c70731a304

      SHA256

      27d1445c2b2370b28c53682b8d491fe8f192bbaf3b19dcb04e73692cfe6bf4ed

      SHA512

      4e0c4f78f8b19372adc4a6f26499fbc8ce5f85b3f04aac903235ab6be04d6b1dfdb95670dcfd4d5e41e0aeeb81d5cf253146459394724379c141e503eab574a6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      0ded9d5de316469d64d39cc63368f159

      SHA1

      bd5f4d3da2973fc6f0466efe72d258c70731a304

      SHA256

      27d1445c2b2370b28c53682b8d491fe8f192bbaf3b19dcb04e73692cfe6bf4ed

      SHA512

      4e0c4f78f8b19372adc4a6f26499fbc8ce5f85b3f04aac903235ab6be04d6b1dfdb95670dcfd4d5e41e0aeeb81d5cf253146459394724379c141e503eab574a6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      0ded9d5de316469d64d39cc63368f159

      SHA1

      bd5f4d3da2973fc6f0466efe72d258c70731a304

      SHA256

      27d1445c2b2370b28c53682b8d491fe8f192bbaf3b19dcb04e73692cfe6bf4ed

      SHA512

      4e0c4f78f8b19372adc4a6f26499fbc8ce5f85b3f04aac903235ab6be04d6b1dfdb95670dcfd4d5e41e0aeeb81d5cf253146459394724379c141e503eab574a6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      0ded9d5de316469d64d39cc63368f159

      SHA1

      bd5f4d3da2973fc6f0466efe72d258c70731a304

      SHA256

      27d1445c2b2370b28c53682b8d491fe8f192bbaf3b19dcb04e73692cfe6bf4ed

      SHA512

      4e0c4f78f8b19372adc4a6f26499fbc8ce5f85b3f04aac903235ab6be04d6b1dfdb95670dcfd4d5e41e0aeeb81d5cf253146459394724379c141e503eab574a6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      0ded9d5de316469d64d39cc63368f159

      SHA1

      bd5f4d3da2973fc6f0466efe72d258c70731a304

      SHA256

      27d1445c2b2370b28c53682b8d491fe8f192bbaf3b19dcb04e73692cfe6bf4ed

      SHA512

      4e0c4f78f8b19372adc4a6f26499fbc8ce5f85b3f04aac903235ab6be04d6b1dfdb95670dcfd4d5e41e0aeeb81d5cf253146459394724379c141e503eab574a6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      0ded9d5de316469d64d39cc63368f159

      SHA1

      bd5f4d3da2973fc6f0466efe72d258c70731a304

      SHA256

      27d1445c2b2370b28c53682b8d491fe8f192bbaf3b19dcb04e73692cfe6bf4ed

      SHA512

      4e0c4f78f8b19372adc4a6f26499fbc8ce5f85b3f04aac903235ab6be04d6b1dfdb95670dcfd4d5e41e0aeeb81d5cf253146459394724379c141e503eab574a6

    • \Users\Admin\AppData\Local\Temp\7z.dll

      Filesize

      328KB

      MD5

      15bbbe562f9be3e5dcbb834e635cc231

      SHA1

      7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

      SHA256

      ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

      SHA512

      769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

    • \Users\Admin\AppData\Local\Temp\7z.exe

      Filesize

      71KB

      MD5

      8ba2e41b330ae9356e62eb63514cf82e

      SHA1

      8dc266467a5a0d587ed0181d4344581ef4ff30b2

      SHA256

      ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

      SHA512

      2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

    • \Users\Admin\AppData\Local\Temp\7z.exe

      Filesize

      71KB

      MD5

      8ba2e41b330ae9356e62eb63514cf82e

      SHA1

      8dc266467a5a0d587ed0181d4344581ef4ff30b2

      SHA256

      ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

      SHA512

      2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

    • memory/832-81-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/832-80-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/832-68-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/832-70-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1692-75-0x0000000010000000-0x00000000100E2000-memory.dmp

      Filesize

      904KB

    • memory/1692-79-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1692-72-0x0000000000400000-0x0000000000432000-memory.dmp

      Filesize

      200KB

    • memory/1960-28-0x0000000002A50000-0x0000000002A90000-memory.dmp

      Filesize

      256KB

    • memory/1960-29-0x0000000002A50000-0x0000000002A90000-memory.dmp

      Filesize

      256KB

    • memory/1960-30-0x0000000073C00000-0x00000000741AB000-memory.dmp

      Filesize

      5.7MB

    • memory/1960-27-0x0000000073C00000-0x00000000741AB000-memory.dmp

      Filesize

      5.7MB

    • memory/1960-26-0x0000000073C00000-0x00000000741AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2180-65-0x0000000073C00000-0x00000000741AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2180-64-0x0000000073C00000-0x00000000741AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2180-63-0x0000000073C00000-0x00000000741AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2560-46-0x0000000073C00000-0x00000000741AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2560-47-0x0000000073C00000-0x00000000741AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2560-48-0x0000000073C00000-0x00000000741AB000-memory.dmp

      Filesize

      5.7MB

    • memory/2576-56-0x0000000073950000-0x0000000073EFB000-memory.dmp

      Filesize

      5.7MB

    • memory/2576-55-0x0000000073950000-0x0000000073EFB000-memory.dmp

      Filesize

      5.7MB

    • memory/2576-54-0x0000000073950000-0x0000000073EFB000-memory.dmp

      Filesize

      5.7MB

    • memory/2624-37-0x0000000002710000-0x0000000002750000-memory.dmp

      Filesize

      256KB

    • memory/2624-38-0x0000000073950000-0x0000000073EFB000-memory.dmp

      Filesize

      5.7MB

    • memory/2624-39-0x0000000073950000-0x0000000073EFB000-memory.dmp

      Filesize

      5.7MB

    • memory/2624-36-0x0000000073950000-0x0000000073EFB000-memory.dmp

      Filesize

      5.7MB

    • memory/2812-90-0x0000000073990000-0x0000000073F3B000-memory.dmp

      Filesize

      5.7MB

    • memory/2812-92-0x00000000026E0000-0x0000000002720000-memory.dmp

      Filesize

      256KB

    • memory/2812-93-0x00000000026E0000-0x0000000002720000-memory.dmp

      Filesize

      256KB

    • memory/2812-94-0x0000000073990000-0x0000000073F3B000-memory.dmp

      Filesize

      5.7MB

    • memory/2812-95-0x00000000026E0000-0x0000000002720000-memory.dmp

      Filesize

      256KB

    • memory/2812-96-0x00000000026E0000-0x0000000002720000-memory.dmp

      Filesize

      256KB

    • memory/2812-97-0x00000000026E0000-0x0000000002720000-memory.dmp

      Filesize

      256KB

    • memory/2812-91-0x0000000073990000-0x0000000073F3B000-memory.dmp

      Filesize

      5.7MB