Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 22:28

General

  • Target

    15c380a206e671072560129ced0c830f.exe

  • Size

    677KB

  • MD5

    15c380a206e671072560129ced0c830f

  • SHA1

    294b8c09edfc3dde54d523cbc0936bf6a6a16619

  • SHA256

    0e804ac647cbc564b48009e8e9162b6ad857ed3e74e8893f3bd32624c1ac5d58

  • SHA512

    5ebb4eff7ed2ca0a7efc3aa4091393ff8012344ae3b66a4f321a32cd44367a61eae4f1949a5896e460e11b5871549e6206ca4a347d0ca317d8d1664179357df8

  • SSDEEP

    12288:bpvAZajCuM6aZOu4ZreApLi+mVkrK1c8OMs03km7f9hw/jO/EB8QuLBaq6jL:bCZak6sp4reApLiuK18BGmCcBkLBaqW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15c380a206e671072560129ced0c830f.exe
    "C:\Users\Admin\AppData\Local\Temp\15c380a206e671072560129ced0c830f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3732
    • C:\Users\Admin\AppData\Local\Temp\1432080082.exe
      C:\Users\Admin\AppData\Local\Temp\1432080082.exe 7|8|8|0|1|2|1|6|4|3|3 KEhBRDwxLywuHSxMTTpQSEI8KhwsSz5MT09RSUg+OS0dKDxBU1NHQzcuLS8yLxgvQkdDNywdLElKR0RUQVNZRUE6Ki4xNB8tUj9OU0JLV01SSztnbnBtNygna3J1LEM/T0gqTUdILUBOTyhFS0NIGCdDS0dCRUVBOnBDPjdCU0QxT0lMR0UrR0guQ04vPzQ7LhgvQy88LTIyMS4qGC9DMDwnLR0sPSs1LTAeLj4wOioqGCdENDssKxwsTUtHPFVCUl5KTkZTOjtRPR8tT0xLQVI8TFdFVEpANxwsTUtHPFVCUl5IPUpCNhgnRVdDXk9OSToZJz1YRF1CR0BJRkc9NSAuRk5NUFw/S0dPU0RQPC0cLFFBOUZLWE1UWVFPSTYYJ1ZMOzEaK0FQKjUYL1FTTU5FSkJYTz1MQk1MP0VKPkA9TVJLOx8pRVBcS01GVEhLRDdwb3JeGCdSRFJUTEpGS0BXTVNEUF4+PVZQNioYL0dHQz9UOi4ZJ0FTXkJYSD1KRjxXPU5CUFhKUEJBNl5ZbHJjHylATFRHREdBQ11ISjkuNC8mKTk0LDAwMisuLDEYL1NHTD85LjEsKig4NjIyLBwsQUhPRkxOP0NZUEZKPjUtLzEuLiwsLjIjKjIwMjg0LCY+ShknTUE8TW9fbl4iK14xLjcuKiJTZmtdZ29zKkxTJTIrLh4rWitEYmhuZWxrJFFwKSpOcV9vcWweKl4yLS8xKC81NSROXXJyZ25oIS9jKiomMTMeLk9OSTphbGxwJDFgHy5jIiteX2VzLy0qLS4uXV1raWZsLWNqY2weKl5SdGxTY2liQWhvZmxuX2NHXWteYF1qX2Njb2ZrdiIrXik0MjAvMjMxMC4dKmZjbXZoaGxeXWVZbmBlZGwhL2MqLCsyLzY2Li8yIixeLzQ3NjUqMDUvMCxRR0VxSk5FIi9fWjxVd0lSLm5GaXApRERAc0xOUWNePVFsTGlDdERpbC5FYDFnSmhqbEhmNSlFS29qVlIuLkhQZF1QakwzSU00Y1Y8KC1KUmlmVEBCLkRxZ2lXMFVlVFRlYVlOMDZgRkBwYFRgXVBXd2pWLGhmVj1SclF5MndLLUI2R01wSVJDb0BHLUNDRDx4UkpDLnNNZi1dUTJNcFlkb28=
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544455.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4976
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544455.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1420
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544455.txt bios get version
        3⤵
          PID:2836
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544455.txt bios get version
          3⤵
            PID:3216
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81703544455.txt bios get version
            3⤵
              PID:3656
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 944
              3⤵
              • Program crash
              PID:2988
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 4928 -ip 4928
          1⤵
            PID:4132

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\1432080082.exe

            Filesize

            223KB

            MD5

            e4ba09d488441e86d720469e2c14df20

            SHA1

            d107e45313b11a5b2ce23b1c0458ef171898ed5a

            SHA256

            6c05f99fa1af8fc305733a3478aef36033a3d697621d22cabf7d96c20b7a94a4

            SHA512

            d74d5d491dae0f09a50f83a71c4961b2b97cfa807f8ba090dcf4f739b9f4a5cfd3d6e0511113fe11ca27f8bfe4dbe3f29f62a3de68251c2b9d767322a6c8f4e5

          • C:\Users\Admin\AppData\Local\Temp\1432080082.exe

            Filesize

            218KB

            MD5

            12d7da426cbca7fde5154e2bac65a9bc

            SHA1

            6405a45118893c080dded53fd0e611d208a05d82

            SHA256

            a37337d7b7d77c31ed9fb866c6cea66a94740d2fadebe060b0cf3fd8358d4876

            SHA512

            eb86d11a32fa476abadc057ca550e5eb7503180493b22fbd3fe3273cc1f488e8aaefa3ffadfab27902018dc029cca586212fdf4ff896b1f00b601409c51d47a1

          • C:\Users\Admin\AppData\Local\Temp\81703544455.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81703544455.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\81703544455.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\nsq4893.tmp\gnumhdu.dll

            Filesize

            158KB

            MD5

            08be5628b02c48eca543addcdddbb675

            SHA1

            d639ad7383fab427e914201fe7ef9b31703732f6

            SHA256

            e46dcf3c71ad231a37a441a55665b543e7828bd7bb113899b00d893423ef6ff0

            SHA512

            f7948f5ae1d9749abebcf5e20e44689bcdc721e7ce0249c3dcd2e4e2ee35bbc6d1529f404aa1809aad4cf38518c256c0b9d2981956dbe7d56237baa232c20a8e

          • C:\Users\Admin\AppData\Local\Temp\nsq4893.tmp\nsisunz.dll

            Filesize

            40KB

            MD5

            5f13dbc378792f23e598079fc1e4422b

            SHA1

            5813c05802f15930aa860b8363af2b58426c8adf

            SHA256

            6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

            SHA512

            9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5