Analysis

  • max time kernel
    119s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2023 12:28

General

  • Target

    Wishes for our journey November 2023.scr

  • Size

    643.0MB

  • MD5

    211eb4f3ef90b4de98dbaf02ca4e84ea

  • SHA1

    9cedbdb80bfad19a544b654c1acd1bea05100f3d

  • SHA256

    3987ec9427b0cd379f15d0b47495d82fb02d0d81ff7d97c8ecb1cc89d1579855

  • SHA512

    8ce12429bb100cdc4382c37a35292592129af1870f397182b2e5e071be685634d3ff7e29b347fed489190d0e64456f14c97b08be4068537266c75a3cfc60fdc5

  • SSDEEP

    49152:WJM8HnE4zw7vtvw2DnXSGLZDRSh0z5+huOV0J3xoX7ixFgn:WJpzw7vdRDR54u7oy2n

Malware Config

Signatures

  • Downloads MZ/PE file
  • Deletes itself 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Wishes for our journey November 2023.scr
    "C:\Users\Admin\AppData\Local\Temp\Wishes for our journey November 2023.scr" /S
    1⤵
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\ProgramData\KJEHCGDBFC.exe"
      2⤵
        PID:980
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Wishes for our journey November 2023.scr" & del "C:\ProgramData\*.dll"" & exit
        2⤵
        • Deletes itself
        • Suspicious use of WriteProcessMemory
        PID:1992
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 5
          3⤵
          • Delays execution with timeout.exe
          PID:2140

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      b233d403d1262d57f84b5582dfd36a5d

      SHA1

      a06f2c3246f28da7e543aad135e5b23c672e1f2b

      SHA256

      30b7919be52e85a0d8478fefa0efc489cd0eb85151addd4bbf5179bb99583c52

      SHA512

      dc3ac939257426c084f24274f4a82849b317eda91bb5a5ea4f1b36aa9d8d0967323f956fcaaf9e21e5f9c587ea583327b65dec3c24803be9d2eecf221cbc94c1

    • C:\Users\Admin\AppData\Local\Temp\Cab5708.tmp
      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar5768.tmp
      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • memory/980-213-0x0000000002210000-0x0000000002211000-memory.dmp
      Filesize

      4KB

    • memory/2000-3-0x000000002C020000-0x000000002C25A000-memory.dmp
      Filesize

      2.2MB

    • memory/2000-0-0x00000000000E0000-0x00000000000E1000-memory.dmp
      Filesize

      4KB

    • memory/2000-2-0x000000007761F000-0x0000000077620000-memory.dmp
      Filesize

      4KB

    • memory/2000-119-0x000000002C020000-0x000000002C25A000-memory.dmp
      Filesize

      2.2MB

    • memory/2000-120-0x000000002C020000-0x000000002C25A000-memory.dmp
      Filesize

      2.2MB

    • memory/2000-140-0x0000000061E00000-0x0000000061EF3000-memory.dmp
      Filesize

      972KB

    • memory/2000-194-0x00000000001A0000-0x00000000011A0000-memory.dmp
      Filesize

      16.0MB

    • memory/2000-197-0x000000002AF80000-0x000000002B000000-memory.dmp
      Filesize

      512KB

    • memory/2000-199-0x000000002C020000-0x000000002C25A000-memory.dmp
      Filesize

      2.2MB

    • memory/2000-1-0x000000002AF80000-0x000000002B000000-memory.dmp
      Filesize

      512KB