Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2023 13:59

General

  • Target

    e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe

  • Size

    2.3MB

  • MD5

    6004c0cdffdf116879d88f9898738228

  • SHA1

    e8de63f3205bc5483308ab088eec331f56737502

  • SHA256

    e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df

  • SHA512

    ee26398eef63d0dc6bc91df741fd59febd0e187bb57123a606296dd5398e94bd0547658baa5b9802679468907e9433750bb57513b8bd9e66249f586b22d97381

  • SSDEEP

    49152:LboFAXbWg7uiJlwxkJy9gN2hDzDfr02/eQYGpwt:Y7gqHhg

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
    "C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /release
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /release
        3⤵
        • Gathers network information
        PID:2380
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c powershell set-mppreference -exclusionpath C:\
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell set-mppreference -exclusionpath C:\
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2780
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ipconfig /renew
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /renew
        3⤵
        • Gathers network information
        PID:2576
    • C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
      C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
      2⤵
        PID:2588
      • C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
        C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
        2⤵
          PID:2596
        • C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
          C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
          2⤵
            PID:2640
          • C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
            C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
            2⤵
              PID:2648
            • C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
              C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
              2⤵
                PID:2468
              • C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
                C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
                2⤵
                  PID:1012
                • C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
                  C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
                  2⤵
                    PID:1124
                  • C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
                    C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
                    2⤵
                      PID:1760
                    • C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
                      C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
                      2⤵
                        PID:2620
                      • C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
                        C:\Users\Admin\AppData\Local\Temp\e5dddee3a42599e75396f0668e560aed886b995d0f4618c6d81207cd433e85df.exe
                        2⤵
                          PID:2412

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/1748-6-0x0000000004800000-0x000000000484C000-memory.dmp

                        Filesize

                        304KB

                      • memory/1748-14-0x0000000074290000-0x000000007497E000-memory.dmp

                        Filesize

                        6.9MB

                      • memory/1748-2-0x0000000004290000-0x00000000042E8000-memory.dmp

                        Filesize

                        352KB

                      • memory/1748-3-0x0000000004AA0000-0x0000000004AE0000-memory.dmp

                        Filesize

                        256KB

                      • memory/1748-4-0x0000000002060000-0x00000000020A0000-memory.dmp

                        Filesize

                        256KB

                      • memory/1748-5-0x00000000047C0000-0x0000000004800000-memory.dmp

                        Filesize

                        256KB

                      • memory/1748-1-0x0000000074290000-0x000000007497E000-memory.dmp

                        Filesize

                        6.9MB

                      • memory/1748-17-0x0000000074290000-0x000000007497E000-memory.dmp

                        Filesize

                        6.9MB

                      • memory/1748-0-0x0000000000290000-0x00000000004D4000-memory.dmp

                        Filesize

                        2.3MB

                      • memory/1748-15-0x0000000004AA0000-0x0000000004AE0000-memory.dmp

                        Filesize

                        256KB

                      • memory/2780-10-0x000000006F120000-0x000000006F6CB000-memory.dmp

                        Filesize

                        5.7MB

                      • memory/2780-13-0x000000006F120000-0x000000006F6CB000-memory.dmp

                        Filesize

                        5.7MB

                      • memory/2780-12-0x00000000025C0000-0x0000000002600000-memory.dmp

                        Filesize

                        256KB

                      • memory/2780-11-0x00000000025C0000-0x0000000002600000-memory.dmp

                        Filesize

                        256KB

                      • memory/2780-9-0x000000006F120000-0x000000006F6CB000-memory.dmp

                        Filesize

                        5.7MB