Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    16/10/2023, 12:25

General

  • Target

    aa17b69f40915e8e0778bf49c69f04fca5fce4d2dfb32dd50cd323ad371b4a44.exe

  • Size

    399KB

  • MD5

    e6af8a2f7bbfc7f691538347580e7edf

  • SHA1

    1317f20d71068d003978fbfc74507b30126f50de

  • SHA256

    aa17b69f40915e8e0778bf49c69f04fca5fce4d2dfb32dd50cd323ad371b4a44

  • SHA512

    3b992aa441a59248f4b26c49f0c5e1591090de3d22f31addcb179c2cc2f2b0e7a01130f0741b777b04116909697d122a515b1b6557032a1a35bdb960821f4159

  • SSDEEP

    6144:cKiYJL+K7EQ5vrt5AVfL8haEK4sDzLPFZcEOkCybEaQRXr9HNdvOa:wqEU0Vf4ha0sDzDOkx2LIa

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 2 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies data under HKEY_USERS 56 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:420
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Users\Admin\AppData\Local\Temp\aa17b69f40915e8e0778bf49c69f04fca5fce4d2dfb32dd50cd323ad371b4a44.exe
        "C:\Users\Admin\AppData\Local\Temp\aa17b69f40915e8e0778bf49c69f04fca5fce4d2dfb32dd50cd323ad371b4a44.exe"
        2⤵
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2988
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\aa17b69f40915e8e0778bf49c69f04fca5fce4d2dfb32dd50cd323ad371b4a44.exe"
          3⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:2880
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 1
            4⤵
            • Delays execution with timeout.exe
            PID:2848
      • C:\Windows\Help\choice.exe
        "C:\Windows\Help\choice.exe"
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        PID:2572
    • C:\Windows\Syswow64\dfe6ca2b
      C:\Windows\Syswow64\dfe6ca2b
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Windows\Syswow64\dfe6ca2b"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 1
          3⤵
          • Delays execution with timeout.exe
          PID:1516

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IcoD673.exe

      Filesize

      145KB

      MD5

      d2a1752df6431ac0b448cc8f25d0b3d4

      SHA1

      87afaeb38c8bec3278830a470f94ef39726fb26c

      SHA256

      9f4665e08fbfb72b2317bafa85b9ed9491f7df32dd9d818ca726d6d2ae2d4f35

      SHA512

      8411240eea9dd8b048da8a8023f87a2e3411ab67e8f2961ca5098b9df7ba27a5d2b31e339bb2d122a18880633dac569bbf3b6061619656a2582fe5fb16293688

    • C:\Users\Admin\AppData\Local\Temp\IcoD868.tmp

      Filesize

      183KB

      MD5

      e00fb9f91bcbbccb56a2455456d2b70a

      SHA1

      9ad3517db35b63ac08185f395a34980eea5d0840

      SHA256

      07b1a5e314075499de803a074a431ac7376121412b190c1f2deae5976b55403f

      SHA512

      ea3c303976e0ad18a0071c8d16570153ad03f257cc3f5bc59ac3ca3d680a18e714f9711938aa0ebba45532fa4a2b43863f6d210a7ef67ce95d576dd5153cdd20

    • C:\Users\Admin\AppData\Local\Temp\TarBCFA.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\Users\Admin\Desktop\Íæ´«ÆæÇëµãÎÒ.lnk

      Filesize

      1KB

      MD5

      0b95fd58054b55ca1df99d5e0bbc2158

      SHA1

      bbc747b503fa14e7b02a2ccce5f9fb3fefc988b5

      SHA256

      64f46243ab07f8af732bd3acb919d9372bcd204d50dfbda44b0949fcbc74501b

      SHA512

      5de3770fd81bccef09bac8198af72d12dd513938de28ef6f2582309d63139ee929012450cc97ef2128c29a495dc0727daaa4612c2ab889cdaf1e5c3e7f972e1d

    • C:\Windows\Help\choice.exe

      Filesize

      36KB

      MD5

      bd3e64a49311e558c08f4f04b53f82d8

      SHA1

      0edcc10670d29e5ca59702facef13d8f3376afc5

      SHA256

      5af7d20da70ccb712c0e441e83f01be0633f6f804289bff1b3ceb5f853f0dc80

      SHA512

      0f68c67b6ed46ce39d8a9e71e4688c517fa2d852db73666a20cbb12f7202a4083d03007b31d4bb3e4b2877964673a4651fd89752d1d0605a3a6beaefcec94f20

    • C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Windows\SysWOW64\dfe6ca2b

      Filesize

      399KB

      MD5

      e649f3fdc9bea2b76585445c7c5d80f6

      SHA1

      974f2896ea70dd5aca8005b405bae256a12f0ab8

      SHA256

      60ad3fffd2bfc2a46122ed14ba0b10f7f496af53203e1e78b7df9ee290bbafe4

      SHA512

      a9f24aae2bd02806706ea86113a7af7a6d672e10b47679b1299980362da9dd9ae43b0b3ebed9b497055b4f2a6b49b78c0238bfb6276efc7ffd4b4df188e45d46

    • C:\Windows\Syswow64\dfe6ca2b

      Filesize

      399KB

      MD5

      e649f3fdc9bea2b76585445c7c5d80f6

      SHA1

      974f2896ea70dd5aca8005b405bae256a12f0ab8

      SHA256

      60ad3fffd2bfc2a46122ed14ba0b10f7f496af53203e1e78b7df9ee290bbafe4

      SHA512

      a9f24aae2bd02806706ea86113a7af7a6d672e10b47679b1299980362da9dd9ae43b0b3ebed9b497055b4f2a6b49b78c0238bfb6276efc7ffd4b4df188e45d46

    • \Windows\Help\choice.exe

      Filesize

      36KB

      MD5

      bd3e64a49311e558c08f4f04b53f82d8

      SHA1

      0edcc10670d29e5ca59702facef13d8f3376afc5

      SHA256

      5af7d20da70ccb712c0e441e83f01be0633f6f804289bff1b3ceb5f853f0dc80

      SHA512

      0f68c67b6ed46ce39d8a9e71e4688c517fa2d852db73666a20cbb12f7202a4083d03007b31d4bb3e4b2877964673a4651fd89752d1d0605a3a6beaefcec94f20

    • memory/420-46-0x00000000008E0000-0x00000000008E3000-memory.dmp

      Filesize

      12KB

    • memory/420-48-0x0000000000990000-0x00000000009B8000-memory.dmp

      Filesize

      160KB

    • memory/1400-24-0x0000000004E90000-0x0000000004F87000-memory.dmp

      Filesize

      988KB

    • memory/1400-23-0x0000000002570000-0x0000000002573000-memory.dmp

      Filesize

      12KB

    • memory/1400-21-0x0000000002570000-0x0000000002573000-memory.dmp

      Filesize

      12KB

    • memory/1400-19-0x0000000002570000-0x0000000002573000-memory.dmp

      Filesize

      12KB

    • memory/1400-78-0x0000000004E90000-0x0000000004F87000-memory.dmp

      Filesize

      988KB

    • memory/2572-35-0x0000000000090000-0x0000000000093000-memory.dmp

      Filesize

      12KB

    • memory/2572-110-0x0000000001DF0000-0x0000000001DF1000-memory.dmp

      Filesize

      4KB

    • memory/2572-43-0x00000000003E0000-0x00000000004AB000-memory.dmp

      Filesize

      812KB

    • memory/2572-40-0x00000000003E0000-0x00000000004AB000-memory.dmp

      Filesize

      812KB

    • memory/2572-95-0x00000000003E0000-0x00000000004AB000-memory.dmp

      Filesize

      812KB

    • memory/2572-105-0x00000000003E0000-0x00000000004AB000-memory.dmp

      Filesize

      812KB

    • memory/2572-106-0x0000000037980000-0x0000000037990000-memory.dmp

      Filesize

      64KB

    • memory/2572-108-0x0000000001DF0000-0x0000000001DF1000-memory.dmp

      Filesize

      4KB

    • memory/2572-109-0x0000000001DF0000-0x0000000001DF1000-memory.dmp

      Filesize

      4KB

    • memory/2572-44-0x000007FEBF8C0000-0x000007FEBF8D0000-memory.dmp

      Filesize

      64KB

    • memory/2572-111-0x0000000001DF0000-0x0000000001DF1000-memory.dmp

      Filesize

      4KB

    • memory/2572-112-0x00000000030C0000-0x0000000003177000-memory.dmp

      Filesize

      732KB

    • memory/2572-113-0x00000000030C0000-0x0000000003177000-memory.dmp

      Filesize

      732KB

    • memory/2572-39-0x0000000000090000-0x0000000000093000-memory.dmp

      Filesize

      12KB

    • memory/2572-29-0x0000000000060000-0x0000000000061000-memory.dmp

      Filesize

      4KB

    • memory/2572-28-0x0000000000170000-0x0000000000233000-memory.dmp

      Filesize

      780KB

    • memory/2572-123-0x0000000001DF0000-0x0000000001DF1000-memory.dmp

      Filesize

      4KB

    • memory/2572-124-0x00000000030C0000-0x0000000003177000-memory.dmp

      Filesize

      732KB