Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 17:03

General

  • Target

    bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe

  • Size

    399KB

  • MD5

    6b536c7f28c331c46c88e5e1827f83d0

  • SHA1

    c55b37d2fcbe8c5178f065b7fb08395aafd68dc9

  • SHA256

    bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb

  • SHA512

    7e22107cb788c71459510aef25a2123c058855e03c7c4ea6530f457246b7d84aad965b8cce90ed305d94f66ca8e9699d26e80b03572b13e710738dc77112d5e0

  • SSDEEP

    6144:XKiYJL+K7EQ5vrt5AVfL8haEK4sDzLPFZcEOkCybEaQRXr9HNdvOa:LqEU0Vf4ha0sDzDOkx2LIa

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 2 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:420
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Users\Admin\AppData\Local\Temp\bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe
        "C:\Users\Admin\AppData\Local\Temp\bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe"
        2⤵
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\bc082e85f4f4ea47b3a27d31690c78bdffec1444a5d548b12442f8d73bf524eb.exe"
          3⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:2432
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 1
            4⤵
            • Delays execution with timeout.exe
            PID:1704
      • C:\Windows\Help\quser.exe
        "C:\Windows\Help\quser.exe"
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        PID:2700
    • C:\Windows\Syswow64\f97a9d44
      C:\Windows\Syswow64\f97a9d44
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Windows\Syswow64\f97a9d44"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1608
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 1
          3⤵
          • Delays execution with timeout.exe
          PID:1472

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Cab7C8F.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Ico9899.exe

      Filesize

      145KB

      MD5

      d2a1752df6431ac0b448cc8f25d0b3d4

      SHA1

      87afaeb38c8bec3278830a470f94ef39726fb26c

      SHA256

      9f4665e08fbfb72b2317bafa85b9ed9491f7df32dd9d818ca726d6d2ae2d4f35

      SHA512

      8411240eea9dd8b048da8a8023f87a2e3411ab67e8f2961ca5098b9df7ba27a5d2b31e339bb2d122a18880633dac569bbf3b6061619656a2582fe5fb16293688

    • C:\Users\Admin\AppData\Local\Temp\Ico9ACC.tmp

      Filesize

      183KB

      MD5

      e00fb9f91bcbbccb56a2455456d2b70a

      SHA1

      9ad3517db35b63ac08185f395a34980eea5d0840

      SHA256

      07b1a5e314075499de803a074a431ac7376121412b190c1f2deae5976b55403f

      SHA512

      ea3c303976e0ad18a0071c8d16570153ad03f257cc3f5bc59ac3ca3d680a18e714f9711938aa0ebba45532fa4a2b43863f6d210a7ef67ce95d576dd5153cdd20

    • C:\Users\Admin\Desktop\Íæ´«ÆæÇëµãÎÒ.lnk

      Filesize

      1KB

      MD5

      cc72264f35a380878548f8cc7edbdb2c

      SHA1

      88f6b90ae35427fe6432e77dd1dec61514f79fbd

      SHA256

      e33dd193cbe6afc9f891eac357bf2e95640bd70ff7c71489381f5dd8be021e42

      SHA512

      1137c6ee1c4ad15676a61bda8558bb1ddd2768b075f446180f23ca462ad775841ccd45859750b20529a61df13546e5943437ca7df9bd88bf0cc703c741230906

    • C:\Windows\Help\quser.exe

      Filesize

      23KB

      MD5

      b31b93fadfe4a2727f7f136f59e577fd

      SHA1

      dc82e060bda5d7a41aa477e23c31fa969bab82ed

      SHA256

      363d202d3c269dee639dc437b5d190b4ff8ecbb3807b70dfdfe08d7355976fa3

      SHA512

      b336f0d14db9655741ede7eb0b43417dddcbf92316b4c17e0854f16c971a2442e446bc3dd32b28cf35e16b63d50e2b1c09f5a537eb9d1e133159973324a90cee

    • C:\Windows\SysWOW64\f97a9d44

      Filesize

      399KB

      MD5

      1b3fc803e8525cba3bb2a7f682845684

      SHA1

      f159b8af078d2f43d49eb9aa46a851fb90c24609

      SHA256

      efbb9477920d2e6aacd3b4738df3dad9ee42ddafcbe15ca21689451847a9b0ac

      SHA512

      1170e6941412502935be689264e4f735b3c73a4bc7add72a4588f2fad25face032b89d03a59b69db17d35b67d4d62875731a55403fdeaed1cd5023773e8c7c17

    • C:\Windows\Syswow64\f97a9d44

      Filesize

      399KB

      MD5

      1b3fc803e8525cba3bb2a7f682845684

      SHA1

      f159b8af078d2f43d49eb9aa46a851fb90c24609

      SHA256

      efbb9477920d2e6aacd3b4738df3dad9ee42ddafcbe15ca21689451847a9b0ac

      SHA512

      1170e6941412502935be689264e4f735b3c73a4bc7add72a4588f2fad25face032b89d03a59b69db17d35b67d4d62875731a55403fdeaed1cd5023773e8c7c17

    • C:\Windows\Temp\Tar8421.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • \Windows\Help\quser.exe

      Filesize

      23KB

      MD5

      b31b93fadfe4a2727f7f136f59e577fd

      SHA1

      dc82e060bda5d7a41aa477e23c31fa969bab82ed

      SHA256

      363d202d3c269dee639dc437b5d190b4ff8ecbb3807b70dfdfe08d7355976fa3

      SHA512

      b336f0d14db9655741ede7eb0b43417dddcbf92316b4c17e0854f16c971a2442e446bc3dd32b28cf35e16b63d50e2b1c09f5a537eb9d1e133159973324a90cee

    • memory/420-46-0x0000000000400000-0x0000000000403000-memory.dmp

      Filesize

      12KB

    • memory/420-48-0x0000000000810000-0x0000000000838000-memory.dmp

      Filesize

      160KB

    • memory/1412-24-0x0000000006C20000-0x0000000006D17000-memory.dmp

      Filesize

      988KB

    • memory/1412-23-0x0000000006C20000-0x0000000006D17000-memory.dmp

      Filesize

      988KB

    • memory/1412-21-0x0000000002760000-0x0000000002763000-memory.dmp

      Filesize

      12KB

    • memory/1412-22-0x0000000002760000-0x0000000002763000-memory.dmp

      Filesize

      12KB

    • memory/1412-59-0x0000000006C20000-0x0000000006D17000-memory.dmp

      Filesize

      988KB

    • memory/1412-19-0x0000000002760000-0x0000000002763000-memory.dmp

      Filesize

      12KB

    • memory/2700-30-0x0000000000060000-0x0000000000061000-memory.dmp

      Filesize

      4KB

    • memory/2700-44-0x000007FEBE360000-0x000007FEBE370000-memory.dmp

      Filesize

      64KB

    • memory/2700-87-0x0000000037890000-0x00000000378A0000-memory.dmp

      Filesize

      64KB

    • memory/2700-89-0x0000000000810000-0x0000000000838000-memory.dmp

      Filesize

      160KB

    • memory/2700-43-0x0000000000340000-0x000000000040B000-memory.dmp

      Filesize

      812KB

    • memory/2700-106-0x0000000000340000-0x000000000040B000-memory.dmp

      Filesize

      812KB

    • memory/2700-107-0x0000000002090000-0x0000000002091000-memory.dmp

      Filesize

      4KB

    • memory/2700-108-0x0000000000340000-0x000000000040B000-memory.dmp

      Filesize

      812KB

    • memory/2700-41-0x0000000000340000-0x000000000040B000-memory.dmp

      Filesize

      812KB

    • memory/2700-110-0x0000000004270000-0x0000000004327000-memory.dmp

      Filesize

      732KB

    • memory/2700-111-0x0000000004270000-0x0000000004327000-memory.dmp

      Filesize

      732KB

    • memory/2700-114-0x0000000004270000-0x0000000004327000-memory.dmp

      Filesize

      732KB

    • memory/2700-40-0x00000000001E0000-0x00000000001E3000-memory.dmp

      Filesize

      12KB

    • memory/2700-36-0x00000000001E0000-0x00000000001E3000-memory.dmp

      Filesize

      12KB

    • memory/2700-28-0x0000000000110000-0x00000000001D3000-memory.dmp

      Filesize

      780KB

    • memory/2700-122-0x0000000002090000-0x0000000002091000-memory.dmp

      Filesize

      4KB

    • memory/2700-123-0x0000000004270000-0x0000000004327000-memory.dmp

      Filesize

      732KB