Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2023, 22:40

General

  • Target

    0x000a000000012025-3.exe

  • Size

    37KB

  • MD5

    35727b79d04ec3ec0733ed94e6021fb7

  • SHA1

    883975332aa2520557fd7432a4be478544fa1926

  • SHA256

    6a2fb9232ed317a5f3864baf7b7f58a8ba042ecc46486a986e10ce9f4625efab

  • SHA512

    d1c0b8824cc0aae115f3b7fbf91428c62a46e2a171d0271b8391227a409ac2fbcc270b144dba7219314007e8b64d16320b8e4c74db3b8f738e3bdc1f2bc9a277

  • SSDEEP

    384:k0SvEiTbTvpWNcZ0y8fvCv3v3cLkacpjrAF+rMRTyN/0L+EcoinblneHQM3epzXY:fS7TZ38fvCv3E1c1rM+rMRa8Nu72t

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops autorun.inf file 1 TTPs 5 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x000a000000012025-3.exe
    "C:\Users\Admin\AppData\Local\Temp\0x000a000000012025-3.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops autorun.inf file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\0x000a000000012025-3.exe" "0x000a000000012025-3.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:2644

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • F:\svchost.exe

          Filesize

          37KB

          MD5

          35727b79d04ec3ec0733ed94e6021fb7

          SHA1

          883975332aa2520557fd7432a4be478544fa1926

          SHA256

          6a2fb9232ed317a5f3864baf7b7f58a8ba042ecc46486a986e10ce9f4625efab

          SHA512

          d1c0b8824cc0aae115f3b7fbf91428c62a46e2a171d0271b8391227a409ac2fbcc270b144dba7219314007e8b64d16320b8e4c74db3b8f738e3bdc1f2bc9a277

        • memory/2224-0-0x0000000074B00000-0x00000000750AB000-memory.dmp

          Filesize

          5.7MB

        • memory/2224-1-0x0000000074B00000-0x00000000750AB000-memory.dmp

          Filesize

          5.7MB

        • memory/2224-2-0x00000000004C0000-0x0000000000500000-memory.dmp

          Filesize

          256KB

        • memory/2224-12-0x0000000074B00000-0x00000000750AB000-memory.dmp

          Filesize

          5.7MB

        • memory/2224-13-0x0000000074B00000-0x00000000750AB000-memory.dmp

          Filesize

          5.7MB

        • memory/2224-14-0x00000000004C0000-0x0000000000500000-memory.dmp

          Filesize

          256KB