Analysis

  • max time kernel
    50s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/10/2023, 17:22

General

  • Target

    FunBot.exe

  • Size

    9.6MB

  • MD5

    e3730601d0e363e8c3fd5a32842d0cb6

  • SHA1

    4da77cd69f010263c2275d37907640486c247478

  • SHA256

    8a8227e7d6ea348ff346edc4084d28ec6919f26bb3b8571d8c7e7f54b5a00de1

  • SHA512

    736db7d865144aec4f47095cfa6e18e6dde9e895c27ce88c245557907e105b2da452aa63e2c6281008c2987798a89a5c88c5c40eaacc9a5c67434a96d7406c9c

  • SSDEEP

    196608:aPGwfgtL5OKcwz6eAeDBoWOAWWnDgrvWXLeSKzolioWNz9c57E2ufaK5oF0zqH:BwfiL5J4FeDBoW3WAgrvW7eb+5vH

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 45 IoCs
  • Suspicious use of SendNotifyMessage 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FunBot.exe
    "C:\Users\Admin\AppData\Local\Temp\FunBot.exe"
    1⤵
      PID:1944
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4112
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3968

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/3968-0-0x000001E8C4940000-0x000001E8C4941000-memory.dmp

              Filesize

              4KB

            • memory/3968-1-0x000001E8C4940000-0x000001E8C4941000-memory.dmp

              Filesize

              4KB

            • memory/3968-2-0x000001E8C4940000-0x000001E8C4941000-memory.dmp

              Filesize

              4KB

            • memory/3968-7-0x000001E8C4940000-0x000001E8C4941000-memory.dmp

              Filesize

              4KB

            • memory/3968-6-0x000001E8C4940000-0x000001E8C4941000-memory.dmp

              Filesize

              4KB

            • memory/3968-9-0x000001E8C4940000-0x000001E8C4941000-memory.dmp

              Filesize

              4KB

            • memory/3968-8-0x000001E8C4940000-0x000001E8C4941000-memory.dmp

              Filesize

              4KB

            • memory/3968-11-0x000001E8C4940000-0x000001E8C4941000-memory.dmp

              Filesize

              4KB

            • memory/3968-10-0x000001E8C4940000-0x000001E8C4941000-memory.dmp

              Filesize

              4KB

            • memory/3968-12-0x000001E8C4940000-0x000001E8C4941000-memory.dmp

              Filesize

              4KB