Analysis

  • max time kernel
    151s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    22-10-2023 03:35

General

  • Target

    f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe

  • Size

    4.3MB

  • MD5

    6f100fd99236d88d87408239b808695d

  • SHA1

    8c8a22a6c5274285ef86308fcea772407b7dcb1c

  • SHA256

    f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3

  • SHA512

    7fc3b46eafec82359c0bf539cb8bf798f9f2f9dcc956d44cb37c5313e91b16aff3ef6964418d4485400a6ea24094d7651c8dff382312335f733b9b1440970008

  • SSDEEP

    49152:OQ6nZ5QZuTtS0rQMYOQ+q8CEvQ6ngQ6nx9KFeMkFd////z9qw:B6ZWsM0r1QnJ6X6x0FefFd////z9qw

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:420
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Users\Admin\AppData\Local\Temp\f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe
        "C:\Users\Admin\AppData\Local\Temp\f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe"
        2⤵
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2052
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\f2108f579489cf70ad58ef411029cb794d1d491652a563eb08b79c4279075fa3.exe"
          3⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:2540
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 1
            4⤵
            • Delays execution with timeout.exe
            PID:2892
      • C:\pcalua.exe
        "C:\pcalua.exe"
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6921ea732fc80242cc48fc41ae25254f

      SHA1

      52cab49748521ba319eecfbfd0b850d97d359711

      SHA256

      340f53c0727aa63b11f1de3bf5e448db303fc1fd4f7f8cd96dd354c2a617fc6d

      SHA512

      5e6f422bb10eefcba587f21fd7c124d76b80c7024ec736ed2b00c2b533b4bc8ee36d143b9994525139382be7f7a40792843a5f15df870df7b65a54ca1a3944ef

    • C:\Users\Admin\AppData\Local\Temp\CabC979.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar6AAA.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • C:\pcalua.exe

      Filesize

      9KB

      MD5

      2549089234e799d510296d327ea2b679

      SHA1

      280038828c2412f3867ddb22e07759cb26f7d8ea

      SHA256

      823d3530fc8b4a8069c7b70fd5eb393ac789bae6cda07652cc4f341461c66d48

      SHA512

      a2dc06f15a1a6d388eebc58621541187fca938bb2d5740f37674df1e28009127284ac36a7c05d0451ab232b9a3c92e85ca89aedc1fdb29562b90271f6ee7f03d

    • memory/420-50-0x0000000000770000-0x0000000000798000-memory.dmp

      Filesize

      160KB

    • memory/420-48-0x0000000000770000-0x0000000000798000-memory.dmp

      Filesize

      160KB

    • memory/420-46-0x0000000000760000-0x0000000000763000-memory.dmp

      Filesize

      12KB

    • memory/1228-137-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-143-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-24-0x0000000006C20000-0x0000000006D17000-memory.dmp

      Filesize

      988KB

    • memory/1228-153-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-23-0x0000000006C20000-0x0000000006D17000-memory.dmp

      Filesize

      988KB

    • memory/1228-122-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-152-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-151-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-150-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-149-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-148-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-21-0x0000000002A30000-0x0000000002A33000-memory.dmp

      Filesize

      12KB

    • memory/1228-20-0x0000000002A30000-0x0000000002A33000-memory.dmp

      Filesize

      12KB

    • memory/1228-147-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-146-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-58-0x0000000006C20000-0x0000000006D17000-memory.dmp

      Filesize

      988KB

    • memory/1228-145-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-144-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-22-0x0000000002A30000-0x0000000002A33000-memory.dmp

      Filesize

      12KB

    • memory/1228-127-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-142-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-141-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-140-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-139-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-138-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-136-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-135-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-134-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-133-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-121-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-132-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-131-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-118-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-120-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-130-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-129-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-128-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-124-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-125-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/1228-126-0x0000000002A70000-0x0000000002A71000-memory.dmp

      Filesize

      4KB

    • memory/2052-81-0x0000000001140000-0x00000000011AC000-memory.dmp

      Filesize

      432KB

    • memory/2052-0-0x0000000001140000-0x00000000011AC000-memory.dmp

      Filesize

      432KB

    • memory/2052-49-0x0000000001140000-0x00000000011AC000-memory.dmp

      Filesize

      432KB

    • memory/2052-3-0x0000000001140000-0x00000000011AC000-memory.dmp

      Filesize

      432KB

    • memory/2052-2-0x0000000001140000-0x00000000011AC000-memory.dmp

      Filesize

      432KB

    • memory/2052-1-0x0000000001140000-0x00000000011AC000-memory.dmp

      Filesize

      432KB

    • memory/2744-105-0x00000000374A0000-0x00000000374B0000-memory.dmp

      Filesize

      64KB

    • memory/2744-119-0x0000000003CA0000-0x0000000003D40000-memory.dmp

      Filesize

      640KB

    • memory/2744-113-0x0000000003CA0000-0x0000000003D40000-memory.dmp

      Filesize

      640KB

    • memory/2744-111-0x0000000003CA0000-0x0000000003D40000-memory.dmp

      Filesize

      640KB

    • memory/2744-114-0x0000000001CC0000-0x0000000001CC1000-memory.dmp

      Filesize

      4KB

    • memory/2744-110-0x0000000001CD0000-0x0000000001CDF000-memory.dmp

      Filesize

      60KB

    • memory/2744-109-0x0000000001CC0000-0x0000000001CC1000-memory.dmp

      Filesize

      4KB

    • memory/2744-108-0x0000000001CC0000-0x0000000001CC1000-memory.dmp

      Filesize

      4KB

    • memory/2744-107-0x0000000000770000-0x0000000000798000-memory.dmp

      Filesize

      160KB

    • memory/2744-43-0x000007FEBF1C0000-0x000007FEBF1D0000-memory.dmp

      Filesize

      64KB

    • memory/2744-116-0x0000000003CA0000-0x0000000003D40000-memory.dmp

      Filesize

      640KB

    • memory/2744-112-0x0000000003CA0000-0x0000000003D40000-memory.dmp

      Filesize

      640KB

    • memory/2744-59-0x0000000001D90000-0x0000000001E5B000-memory.dmp

      Filesize

      812KB

    • memory/2744-115-0x0000000001CD0000-0x0000000001CDF000-memory.dmp

      Filesize

      60KB

    • memory/2744-35-0x00000000001E0000-0x00000000001E3000-memory.dmp

      Filesize

      12KB

    • memory/2744-123-0x0000000001CC0000-0x0000000001CD0000-memory.dmp

      Filesize

      64KB

    • memory/2744-44-0x0000000001D90000-0x0000000001E5B000-memory.dmp

      Filesize

      812KB

    • memory/2744-42-0x0000000001D90000-0x0000000001E5B000-memory.dmp

      Filesize

      812KB

    • memory/2744-39-0x00000000001E0000-0x00000000001E3000-memory.dmp

      Filesize

      12KB

    • memory/2744-29-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/2744-27-0x00000000000E0000-0x00000000001A3000-memory.dmp

      Filesize

      780KB

    • memory/2744-159-0x0000000003CA0000-0x0000000003D40000-memory.dmp

      Filesize

      640KB

    • memory/2744-160-0x0000000001CC0000-0x0000000001CC1000-memory.dmp

      Filesize

      4KB

    • memory/2744-161-0x0000000001CE0000-0x0000000001CE1000-memory.dmp

      Filesize

      4KB