Analysis

  • max time kernel
    129s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    16/11/2023, 08:42

General

  • Target

    733a65332795b87d6823360df7f0b9cd01955aedf9f516d1f43c983c69834b0e.exe

  • Size

    244KB

  • MD5

    c91d610830720daaf552f5f7ac2259bc

  • SHA1

    b566d48ae9127d8841afc4df802b1a957f0bbdcb

  • SHA256

    733a65332795b87d6823360df7f0b9cd01955aedf9f516d1f43c983c69834b0e

  • SHA512

    34fc24e2939370b3e532370aaa1f70c0eabb55286f24822ed3ecabff24dac5463b695f780ccebac1f1413d778e674ee4dc3613a6c1c5820161ce3ffe140dc88c

  • SSDEEP

    6144:pN2Q8nvV11UyrSYVnr+9V3C6jx444444v:pmvV1qymYCJC6j

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 38 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\733a65332795b87d6823360df7f0b9cd01955aedf9f516d1f43c983c69834b0e.exe
    "C:\Users\Admin\AppData\Local\Temp\733a65332795b87d6823360df7f0b9cd01955aedf9f516d1f43c983c69834b0e.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\system32\cmd.exe
      cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C30046CF-B330-4116-B19D-3907F56E78DF}'" delete
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Windows\System32\wbem\WMIC.exe
        C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{C30046CF-B330-4116-B19D-3907F56E78DF}'" delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2784
    • C:\Windows\system32\cmd.exe
      cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{5434434E-5303-4440-9DDE-923A4474E301}'" delete
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Windows\System32\wbem\WMIC.exe
        C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{5434434E-5303-4440-9DDE-923A4474E301}'" delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2740
    • C:\Windows\system32\cmd.exe
      cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{065A2E1B-2F32-4B42-94A3-080AD11AF8C0}'" delete
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Windows\System32\wbem\WMIC.exe
        C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{065A2E1B-2F32-4B42-94A3-080AD11AF8C0}'" delete
        3⤵
          PID:2616
      • C:\Windows\system32\cmd.exe
        cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{55CD7D1A-7F8C-4A0C-B08C-7C9235BE67A6}'" delete
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2296
        • C:\Windows\System32\wbem\WMIC.exe
          C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{55CD7D1A-7F8C-4A0C-B08C-7C9235BE67A6}'" delete
          3⤵
            PID:2472
        • C:\Windows\system32\cmd.exe
          cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{CDCB8359-BB55-4254-B547-F0F4A17C26B3}'" delete
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2872
          • C:\Windows\System32\wbem\WMIC.exe
            C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{CDCB8359-BB55-4254-B547-F0F4A17C26B3}'" delete
            3⤵
              PID:2808
          • C:\Windows\system32\cmd.exe
            cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{DC606B48-7971-4131-95DF-3B81FD582B64}'" delete
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2928
            • C:\Windows\System32\wbem\WMIC.exe
              C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{DC606B48-7971-4131-95DF-3B81FD582B64}'" delete
              3⤵
                PID:2948
            • C:\Windows\system32\cmd.exe
              cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8F0F5338-BFBE-4CE5-962B-D6837CD11E60}'" delete
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2532
              • C:\Windows\System32\wbem\WMIC.exe
                C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{8F0F5338-BFBE-4CE5-962B-D6837CD11E60}'" delete
                3⤵
                  PID:2184
              • C:\Windows\system32\cmd.exe
                cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{67B36C8F-9166-4A06-A0DA-9B5FA409472E}'" delete
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1804
                • C:\Windows\System32\wbem\WMIC.exe
                  C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{67B36C8F-9166-4A06-A0DA-9B5FA409472E}'" delete
                  3⤵
                    PID:548
                • C:\Windows\system32\cmd.exe
                  cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{49210D85-E091-4C8F-B0BF-F3450C61B4ED}'" delete
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1628
                  • C:\Windows\System32\wbem\WMIC.exe
                    C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{49210D85-E091-4C8F-B0BF-F3450C61B4ED}'" delete
                    3⤵
                      PID:2720
                  • C:\Windows\system32\cmd.exe
                    cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2A73262F-FF96-48CE-BF3F-608073D79047}'" delete
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:860
                    • C:\Windows\System32\wbem\WMIC.exe
                      C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{2A73262F-FF96-48CE-BF3F-608073D79047}'" delete
                      3⤵
                        PID:1508
                    • C:\Windows\system32\cmd.exe
                      cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{279C7090-298E-4577-A2D1-3F1CA0B08E77}'" delete
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2332
                      • C:\Windows\System32\wbem\WMIC.exe
                        C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{279C7090-298E-4577-A2D1-3F1CA0B08E77}'" delete
                        3⤵
                          PID:2856
                      • C:\Windows\system32\cmd.exe
                        cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4B21BC4F-429F-42EA-8B4C-F354FAA1C1E3}'" delete
                        2⤵
                          PID:628
                          • C:\Windows\System32\wbem\WMIC.exe
                            C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{4B21BC4F-429F-42EA-8B4C-F354FAA1C1E3}'" delete
                            3⤵
                              PID:1552
                          • C:\Windows\system32\cmd.exe
                            cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6BC086FC-C77C-45BF-83E5-D5378F8E7938}'" delete
                            2⤵
                              PID:1764
                              • C:\Windows\System32\wbem\WMIC.exe
                                C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6BC086FC-C77C-45BF-83E5-D5378F8E7938}'" delete
                                3⤵
                                  PID:1380
                              • C:\Windows\system32\cmd.exe
                                cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6CD0DD6C-116E-47DA-826F-49336B360923}'" delete
                                2⤵
                                  PID:2232
                                  • C:\Windows\System32\wbem\WMIC.exe
                                    C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{6CD0DD6C-116E-47DA-826F-49336B360923}'" delete
                                    3⤵
                                      PID:2260
                                  • C:\Windows\system32\cmd.exe
                                    cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{5B95C8E5-0EC7-4DAB-91D8-93B4F3BE799A}'" delete
                                    2⤵
                                      PID:2032
                                      • C:\Windows\System32\wbem\WMIC.exe
                                        C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{5B95C8E5-0EC7-4DAB-91D8-93B4F3BE799A}'" delete
                                        3⤵
                                          PID:2060
                                      • C:\Windows\system32\cmd.exe
                                        cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{69C393A9-38B4-4B55-BF5C-3D4A1ABE9B5D}'" delete
                                        2⤵
                                          PID:2256
                                          • C:\Windows\System32\wbem\WMIC.exe
                                            C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{69C393A9-38B4-4B55-BF5C-3D4A1ABE9B5D}'" delete
                                            3⤵
                                              PID:1796
                                          • C:\Windows\system32\cmd.exe
                                            cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{62EDDC6A-E788-436C-9A3F-A16093BB09A1}'" delete
                                            2⤵
                                              PID:1360
                                              • C:\Windows\System32\wbem\WMIC.exe
                                                C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{62EDDC6A-E788-436C-9A3F-A16093BB09A1}'" delete
                                                3⤵
                                                  PID:2300
                                              • C:\Windows\system32\cmd.exe
                                                cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A3432411-7E71-4E5C-9B47-133BBE633E21}'" delete
                                                2⤵
                                                  PID:1080
                                                  • C:\Windows\System32\wbem\WMIC.exe
                                                    C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{A3432411-7E71-4E5C-9B47-133BBE633E21}'" delete
                                                    3⤵
                                                      PID:1936
                                                • C:\Windows\system32\vssvc.exe
                                                  C:\Windows\system32\vssvc.exe
                                                  1⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2976

                                                Network

                                                      MITRE ATT&CK Matrix

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads