Analysis

  • max time kernel
    161s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-10-2023 21:16

General

  • Target

    9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe

  • Size

    60KB

  • MD5

    6aa22fd28d56b38bdf8dfc90dbd6dc96

  • SHA1

    1e28cf53cbcacde5a272669cdd1670785183272a

  • SHA256

    9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0

  • SHA512

    cb882269950289b614c1009eabc0a69ac8fb371a62af4e488413e10c60c0defeb5ad891e56a680e9cd60cb6971bcef8e35cc2899b17897d6ba1767e5be97ec35

  • SSDEEP

    768:3kWI7wOxRW1Hn/txYKtXeQJCAhxPPqEAQemUJiKrji0tSdZRNoN5J:3kWI7kHn/f/tugCsxPSEA3mUJiKadYJ

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 3 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe
    "C:\Users\Admin\AppData\Local\Temp\9b87457fe85670e2c059cedaa560a8a31027e96fe18b2b6a7fe610f38423b2f0.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Windows\programs\ini.exe
      C:\Windows\programs\ini.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2612
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\9B8745~1.EXE > nul
      2⤵
        PID:4344

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    2
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    2
    T1547

    Registry Run Keys / Startup Folder

    2
    T1547.001

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\programs\fuckme.vbs
      Filesize

      98B

      MD5

      0925bdaa312fecb530c1d48b220d31ce

      SHA1

      de8d85a93acb9babfa71a74ebb40402b02853043

      SHA256

      3016b31ecee1ad7211b2f541d3314955e4a21d64a820b245bffdc7ac7e8e5d15

      SHA512

      61afae90f93fea10fec1377dbc9181f2746b97b7210ada515d28239354f092ab34e40fb1b53293fbdcea13ded1d99fa3fdcbc14464f41354f54aecfa227e8af7

    • C:\Windows\programs\ini.exe
      Filesize

      60KB

      MD5

      0c409785272193c4e042a5455834c2af

      SHA1

      a569e2ccf5529634f41640a26229ef6be613219f

      SHA256

      ec39ca8d8d874a8366b49c0d8a8b61049b13978acbec8aea59f4837117f6114e

      SHA512

      1b5dcf87c048e0780478e2bcb09ce15772d44a7bed54bdf1e0281f9d22a4276572cd30bd4d7ea191499af4bac3bc6ad522b8ea7069daf85a61e9937997dc0db0

    • C:\Windows\programs\ini.exe
      Filesize

      60KB

      MD5

      0c409785272193c4e042a5455834c2af

      SHA1

      a569e2ccf5529634f41640a26229ef6be613219f

      SHA256

      ec39ca8d8d874a8366b49c0d8a8b61049b13978acbec8aea59f4837117f6114e

      SHA512

      1b5dcf87c048e0780478e2bcb09ce15772d44a7bed54bdf1e0281f9d22a4276572cd30bd4d7ea191499af4bac3bc6ad522b8ea7069daf85a61e9937997dc0db0

    • C:\Windows\programs\wsock32.dll
      Filesize

      17KB

      MD5

      02b73a0697baf1daf7690ffacd9fdedf

      SHA1

      f7135318f488a7fe7b19bfabc98f91edab190f66

      SHA256

      6c2b79175b503d14474852132117e1f36cb25c70bee3507215d8dbb85c28e8b9

      SHA512

      6005b81993ffcc6fc1b6809e00b7d4fc3dfc93d6c74f6f08a81471701f1ca7f2f67d18d847a8cf2bb9bab4c4e90beaef3ce0d2ab7002836d723f3d94aa7748a0

    • memory/2612-14-0x0000000000400000-0x0000000000411000-memory.dmp
      Filesize

      68KB

    • memory/4080-0-0x0000000000400000-0x0000000000411000-memory.dmp
      Filesize

      68KB

    • memory/4080-12-0x0000000000400000-0x0000000000411000-memory.dmp
      Filesize

      68KB