Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231128-en
  • resource tags

    arch:x64arch:x86image:win11-20231128-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11/12/2023, 01:53

General

  • Target

    2 - Copy.exe

  • Size

    902KB

  • MD5

    34a98268ac65cb4ab39175f4035d95ef

  • SHA1

    37aae493e8ca8caa792fb7a4a26859826f3c28e5

  • SHA256

    8e127555bfa80d79e62cf239f53fe66783dc11f5dbe1e42925a0ee9535a85c31

  • SHA512

    2c3775145e1397fa8e2ad8c546079a6e747d241d0bdf30478cc97e378fa62fd66445762fe70d24004b720e56b53b42db38d45c0eb8477a2c65ebc19bf7aa1222

  • SSDEEP

    6144:cedQzQcAKMRUOUqN+0sE6I9raFU4t9nF20bK4rLxWYqaUGrJ+bHpq1:ced6QmMRrNL6e4TFbEYqazrJMg1

Score
8/10

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2 - Copy.exe
    "C:\Users\Admin\AppData\Local\Temp\2 - Copy.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3212
    • C:\Windows\SYSTEM32\schtasks.exe
      schtasks /create /sc minute /mo 1 /tn CClanarTask /tr C:\Users\Admin\AppData\Local\Temp\2 - Copy.exe
      2⤵
      • Creates scheduled task(s)
      PID:4632
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x0000000000000464 0x00000000000004C4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3364

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3212-0-0x000000001B950000-0x000000001B9F6000-memory.dmp

          Filesize

          664KB

        • memory/3212-1-0x00007FFDE8040000-0x00007FFDE89E1000-memory.dmp

          Filesize

          9.6MB

        • memory/3212-3-0x000000001BF00000-0x000000001C3CE000-memory.dmp

          Filesize

          4.8MB

        • memory/3212-2-0x0000000001420000-0x0000000001430000-memory.dmp

          Filesize

          64KB

        • memory/3212-4-0x00007FFDE8040000-0x00007FFDE89E1000-memory.dmp

          Filesize

          9.6MB

        • memory/3212-5-0x000000001C480000-0x000000001C51C000-memory.dmp

          Filesize

          624KB

        • memory/3212-7-0x000000001C5E0000-0x000000001C62C000-memory.dmp

          Filesize

          304KB

        • memory/3212-6-0x0000000001220000-0x0000000001228000-memory.dmp

          Filesize

          32KB

        • memory/3212-8-0x0000000001420000-0x0000000001430000-memory.dmp

          Filesize

          64KB

        • memory/3212-36-0x0000000001420000-0x0000000001430000-memory.dmp

          Filesize

          64KB

        • memory/3212-37-0x0000000001420000-0x0000000001430000-memory.dmp

          Filesize

          64KB

        • memory/3212-38-0x0000000001420000-0x0000000001430000-memory.dmp

          Filesize

          64KB

        • memory/3212-50-0x00007FFDE8040000-0x00007FFDE89E1000-memory.dmp

          Filesize

          9.6MB

        • memory/3212-51-0x0000000001420000-0x0000000001430000-memory.dmp

          Filesize

          64KB

        • memory/3212-52-0x0000000001420000-0x0000000001430000-memory.dmp

          Filesize

          64KB

        • memory/3212-53-0x0000000001420000-0x0000000001430000-memory.dmp

          Filesize

          64KB

        • memory/3212-54-0x0000000001420000-0x0000000001430000-memory.dmp

          Filesize

          64KB

        • memory/3212-55-0x0000000001420000-0x0000000001430000-memory.dmp

          Filesize

          64KB