Analysis

  • max time kernel
    147s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20231025-en
  • resource tags

    arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/11/2023, 06:01

General

  • Target

    57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe

  • Size

    175KB

  • MD5

    f80c45ad8b0c5f6300417d1a096f1084

  • SHA1

    f526bc7e7e4d5cc8dae1108a7a96d67e92c880f6

  • SHA256

    57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51

  • SHA512

    4a5cee0c69ed02d7eb6aa4dc590fda3d151b0f95ecf88eb4070d9fa73cc2afc31791c36b3680b23d0f66af1152410056db58cd82f56aa0c245b5bdf66b963868

  • SSDEEP

    3072:QHSQnvJrkAlEEPuFH4o39wlUpeL/E6vFgJNRR4beXLbRkjFAJDHYhKfJeYUO:QhgAiBB39wlUsTE6vBbeXLbyGJ

Score
10/10

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe
    "C:\Users\Admin\AppData\Local\Temp\57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe"
    1⤵
    • UAC bypass
    • Windows security bypass
    • Windows security modification
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4224
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\57a7963f89e7bc17d95510a7e6932bc8bd519a29cf5b249442d58c72c385ab51.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1296
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
      2⤵
        PID:2084
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
        2⤵
        • Drops startup file
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:980
        • C:\Users\Admin\Pictures\zr5sRGhrwh1tdWOqycn3RnRi.exe
          "C:\Users\Admin\Pictures\zr5sRGhrwh1tdWOqycn3RnRi.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4460
          • C:\Users\Admin\AppData\Local\Temp\Broom.exe
            C:\Users\Admin\AppData\Local\Temp\Broom.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1224

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Broom.exe

      Filesize

      5.3MB

      MD5

      00e93456aa5bcf9f60f84b0c0760a212

      SHA1

      6096890893116e75bd46fea0b8c3921ceb33f57d

      SHA256

      ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

      SHA512

      abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_k2o3ruiw.h0u.ps1

      Filesize

      1B

      MD5

      c4ca4238a0b923820dcc509a6f75849b

      SHA1

      356a192b7913b04c54574d18c28d46e6395428ab

      SHA256

      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

      SHA512

      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

    • C:\Users\Admin\Pictures\PoFl6eYPS4IfszTJvVNES7jZ.exe

      Filesize

      7KB

      MD5

      fcad815e470706329e4e327194acc07c

      SHA1

      c4edd81d00318734028d73be94bc3904373018a9

      SHA256

      280d939a66a0107297091b3b6f86d6529ef6fac222a85dbc82822c3d5dc372b8

      SHA512

      f4031b49946da7c6c270e0354ac845b5c77b9dfcd267442e0571dd33ccd5146bc352ed42b59800c9d166c8c1ede61469a00a4e8d3738d937502584e8a1b72485

    • C:\Users\Admin\Pictures\zr5sRGhrwh1tdWOqycn3RnRi.exe

      Filesize

      2.5MB

      MD5

      e667404b229fb0be21bd339298f5d7c8

      SHA1

      32614e1b3342385b1eb20314e4881482c5d9d22f

      SHA256

      163ff2b3d915e4829962eeb5c7161aacd9473a1c9e36d853d67163f8c409eca5

      SHA512

      a4630141837051cd7b0bf2e58d972601fdb0d17e240abed96a90a72e7ab3631e0133b92c1fe3ab9de0c93032b13f3cba96be58c0745bcb0e1182ed50183522ec

    • C:\Users\Admin\Pictures\zr5sRGhrwh1tdWOqycn3RnRi.exe

      Filesize

      2.5MB

      MD5

      e667404b229fb0be21bd339298f5d7c8

      SHA1

      32614e1b3342385b1eb20314e4881482c5d9d22f

      SHA256

      163ff2b3d915e4829962eeb5c7161aacd9473a1c9e36d853d67163f8c409eca5

      SHA512

      a4630141837051cd7b0bf2e58d972601fdb0d17e240abed96a90a72e7ab3631e0133b92c1fe3ab9de0c93032b13f3cba96be58c0745bcb0e1182ed50183522ec

    • memory/980-16-0x0000000004CF0000-0x0000000004D00000-memory.dmp

      Filesize

      64KB

    • memory/980-7-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/980-12-0x00000000730E0000-0x00000000737CE000-memory.dmp

      Filesize

      6.9MB

    • memory/980-286-0x0000000004CF0000-0x0000000004D00000-memory.dmp

      Filesize

      64KB

    • memory/980-285-0x00000000730E0000-0x00000000737CE000-memory.dmp

      Filesize

      6.9MB

    • memory/1224-51-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

      Filesize

      4KB

    • memory/1224-292-0x0000000000400000-0x0000000000965000-memory.dmp

      Filesize

      5.4MB

    • memory/1224-288-0x0000000000AC0000-0x0000000000AC1000-memory.dmp

      Filesize

      4KB

    • memory/1224-287-0x0000000000400000-0x0000000000965000-memory.dmp

      Filesize

      5.4MB

    • memory/1224-284-0x0000000000400000-0x0000000000965000-memory.dmp

      Filesize

      5.4MB

    • memory/1296-35-0x0000000007B50000-0x0000000007BC6000-memory.dmp

      Filesize

      472KB

    • memory/1296-267-0x0000000007DC0000-0x0000000007DC8000-memory.dmp

      Filesize

      32KB

    • memory/1296-20-0x0000000007360000-0x00000000073C6000-memory.dmp

      Filesize

      408KB

    • memory/1296-21-0x00000000074C0000-0x0000000007526000-memory.dmp

      Filesize

      408KB

    • memory/1296-22-0x0000000007530000-0x0000000007880000-memory.dmp

      Filesize

      3.3MB

    • memory/1296-26-0x00000000074A0000-0x00000000074BC000-memory.dmp

      Filesize

      112KB

    • memory/1296-27-0x00000000078C0000-0x000000000790B000-memory.dmp

      Filesize

      300KB

    • memory/1296-15-0x0000000000C10000-0x0000000000C46000-memory.dmp

      Filesize

      216KB

    • memory/1296-14-0x0000000000C60000-0x0000000000C70000-memory.dmp

      Filesize

      64KB

    • memory/1296-17-0x0000000000C60000-0x0000000000C70000-memory.dmp

      Filesize

      64KB

    • memory/1296-13-0x00000000730E0000-0x00000000737CE000-memory.dmp

      Filesize

      6.9MB

    • memory/1296-283-0x00000000730E0000-0x00000000737CE000-memory.dmp

      Filesize

      6.9MB

    • memory/1296-19-0x0000000006BE0000-0x0000000006C02000-memory.dmp

      Filesize

      136KB

    • memory/1296-18-0x0000000006C30000-0x0000000007258000-memory.dmp

      Filesize

      6.2MB

    • memory/1296-59-0x000000007FAF0000-0x000000007FB00000-memory.dmp

      Filesize

      64KB

    • memory/1296-60-0x0000000008A60000-0x0000000008A93000-memory.dmp

      Filesize

      204KB

    • memory/1296-61-0x0000000070330000-0x000000007037B000-memory.dmp

      Filesize

      300KB

    • memory/1296-62-0x0000000008A40000-0x0000000008A5E000-memory.dmp

      Filesize

      120KB

    • memory/1296-67-0x0000000008DA0000-0x0000000008E45000-memory.dmp

      Filesize

      660KB

    • memory/1296-68-0x0000000000C60000-0x0000000000C70000-memory.dmp

      Filesize

      64KB

    • memory/1296-69-0x0000000008F70000-0x0000000009004000-memory.dmp

      Filesize

      592KB

    • memory/1296-262-0x0000000007DE0000-0x0000000007DFA000-memory.dmp

      Filesize

      104KB

    • memory/4224-2-0x0000000004B70000-0x0000000004C0C000-memory.dmp

      Filesize

      624KB

    • memory/4224-1-0x00000000730E0000-0x00000000737CE000-memory.dmp

      Filesize

      6.9MB

    • memory/4224-3-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/4224-6-0x0000000004DC0000-0x0000000004DDA000-memory.dmp

      Filesize

      104KB

    • memory/4224-4-0x0000000004D00000-0x0000000004D26000-memory.dmp

      Filesize

      152KB

    • memory/4224-0-0x0000000000210000-0x0000000000242000-memory.dmp

      Filesize

      200KB

    • memory/4224-5-0x0000000005260000-0x000000000575E000-memory.dmp

      Filesize

      5.0MB

    • memory/4224-11-0x00000000730E0000-0x00000000737CE000-memory.dmp

      Filesize

      6.9MB