Analysis

  • max time kernel
    124s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2023, 04:21

General

  • Target

    119d9e9121dfc475999a3551eba6ef8f9943a4df2e101c5e189608f0b806bcb0.exe

  • Size

    303KB

  • MD5

    2ef9704ae2006c30910cd926e256d9a5

  • SHA1

    f39d724f7b4ea8d126a6287f07bdbf243fbfb11c

  • SHA256

    119d9e9121dfc475999a3551eba6ef8f9943a4df2e101c5e189608f0b806bcb0

  • SHA512

    fde00647cdb691d5f0dcae711d5f3e1ac8d1b4542381f598d902f5dd6ad542eb10580569b6e35334ef1bff42d948e41085e7d237e893263b16ffcd4d4513d53a

  • SSDEEP

    3072:9TEFDGAGLgqBHwyjOj5jCyQT+IEmwKli4b7HTCKFVsj7dHoK49NoY46DedtUWZeo:hEGJBQ9FjCyQTTEm/EoiLUoh1iVc

Score
8/10

Malware Config

Signatures

  • Registers new Print Monitor 2 TTPs 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 14 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\119d9e9121dfc475999a3551eba6ef8f9943a4df2e101c5e189608f0b806bcb0.exe
    "C:\Users\Admin\AppData\Local\Temp\119d9e9121dfc475999a3551eba6ef8f9943a4df2e101c5e189608f0b806bcb0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c pnputil -e
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Windows\system32\PnPutil.exe
        pnputil -e
        3⤵
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:2944
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c net stop Spooler
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3000
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c reg delete "HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors\GWI Port Monitor\Ports" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2784
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c net start Spooler
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\system32\net.exe
        net start Spooler
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2648
  • C:\Windows\system32\net.exe
    net stop Spooler
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\system32\net1.exe
      C:\Windows\system32\net1 stop Spooler
      2⤵
        PID:1760
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding
      1⤵
        PID:3048
      • C:\Windows\system32\reg.exe
        reg delete "HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors\GWI Port Monitor\Ports" /f
        1⤵
          PID:2796
        • C:\Windows\System32\spoolsv.exe
          C:\Windows\System32\spoolsv.exe
          1⤵
          • Registers new Print Monitor
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:2896
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 start Spooler
          1⤵
            PID:2616

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads