Analysis

  • max time kernel
    136s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 14:58

General

  • Target

    02965b74dd6c2b457aee765e9bdf032b.exe

  • Size

    757KB

  • MD5

    02965b74dd6c2b457aee765e9bdf032b

  • SHA1

    ebfd4480b6bbead8abbc1d52ee4ed66976da757e

  • SHA256

    6df2dbd29508c4ba6427683af38b1db461d6f645258dc3c737c7d196691812c5

  • SHA512

    6e6f151420f417e8703e91c9d1a8475dd07d8e98255dd5d3d9558e1ed6f969cfc953d9981257888f82438c43f6ca6f33ddee1eaad45c04af3b194b1cbdcdbc74

  • SSDEEP

    12288:yJOq88okny7j1dQryuIX14LsPvy+cY7xfSQ6WECyhmbP:yJx8X7jv7TqLsCu5cWEthmbP

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02965b74dd6c2b457aee765e9bdf032b.exe
    "C:\Users\Admin\AppData\Local\Temp\02965b74dd6c2b457aee765e9bdf032b.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun78.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:812
      • C:\Windows\SysWOW64\cacls.exe
        cacls "C:\Users\Admin\Desktop\Internet Explorer.lnk" /G Everyone:R /C
        3⤵
          PID:1908
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
            PID:1572
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun23.bat" "
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1972
          • C:\Windows\SysWOW64\cacls.exe
            cacls "C:\Program Files (x86)\Internet Explorer\ie\iexplore.exe" /G Everyone:R /C
            3⤵
              PID:1036
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
                PID:1844
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun28.bat" "
              2⤵
                PID:2644
                • C:\Windows\SysWOW64\cacls.exe
                  cacls "C:\Users\Admin\Desktop\Internet Explorer.lnk" /G Everyone:R /C
                  3⤵
                    PID:1188
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                      PID:836
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun79.bat" "
                    2⤵
                      PID:1684
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        3⤵
                          PID:2184
                        • C:\Windows\SysWOW64\cacls.exe
                          cacls "C:\Program Files (x86)\Internet Explorer\ie\iexplore.exe" /G Everyone:R /C
                          3⤵
                            PID:1380
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun35.bat" "
                          2⤵
                            PID:1760
                            • C:\Windows\SysWOW64\cacls.exe
                              cacls "C:\Users\Admin\Desktop\Internet Explorer.lnk" /G Everyone:R /C
                              3⤵
                                PID:2188
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                3⤵
                                  PID:1232
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun22.bat" "
                                2⤵
                                • Suspicious use of WriteProcessMemory
                                PID:2128
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                  3⤵
                                    PID:1900
                                  • C:\Windows\SysWOW64\cacls.exe
                                    cacls "C:\Users\Admin\Desktop\Internet Explorer.lnk" /G Everyone:R /C
                                    3⤵
                                      PID:1332
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun17.bat" "
                                    2⤵
                                      PID:1888
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                        3⤵
                                          PID:1156
                                        • C:\Windows\SysWOW64\cacls.exe
                                          cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\\Launch Internet Explorer Browser.lnk" /G Everyone:R /C
                                          3⤵
                                            PID:2932
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun4.bat" "
                                          2⤵
                                            PID:1996
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                              3⤵
                                                PID:2012
                                              • C:\Windows\SysWOW64\cacls.exe
                                                cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\╞⌠╢» Internet Explorer Σ»└└╞≈.lnk" /G Everyone:R /C
                                                3⤵
                                                  PID:3052
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\srun21.bat" "
                                                2⤵
                                                • Suspicious use of WriteProcessMemory
                                                PID:400
                                                • C:\Windows\SysWOW64\cacls.exe
                                                  cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\\Launch Internet Explorer Browser.lnk" /G Everyone:R /C
                                                  3⤵
                                                    PID:2524
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                    3⤵
                                                      PID:1552

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Program Files (x86)\Internet Explorer\ie\iexplore.exe

                                                  Filesize

                                                  787KB

                                                  MD5

                                                  c8a8321292a459b0a17fb39a782a5c74

                                                  SHA1

                                                  ef08e68af5b52c468a905a016ddbfb7c5b0a62e6

                                                  SHA256

                                                  a214e3b654bcb6e6142e101b0e89081d44a3a634afa94dc0a620467335b7beb2

                                                  SHA512

                                                  e43131e59ad638445d041753b3711a261134b7a557c10a462ed26c8db72c90814e561013b8b57fc64be5f9339eba875e14f48af54f0218735e6733227c264553

                                                • C:\Users\Admin\AppData\Local\Temp\srun17.bat

                                                  Filesize

                                                  195B

                                                  MD5

                                                  9bc1c839f58889805174a3ddfe61041f

                                                  SHA1

                                                  fd5ba3c7b7b3e0b4244481bf2f1c05ca70c2b7fc

                                                  SHA256

                                                  7df6e47bce08683ee682c6b57ec179c52b52ec24448448041cc6a14667048087

                                                  SHA512

                                                  1bc08128f6b81196bf9a32bfcf1fe67b1d64440d23f4a35d312220d2c145c10830bfbc4225a1586e53e19ee0b7e5d2c1234e33468acf54947b95667ca5831a3d

                                                • C:\Users\Admin\AppData\Local\Temp\srun21.bat

                                                  Filesize

                                                  195B

                                                  MD5

                                                  df17c26ffc6bddf2bafbe80411bede71

                                                  SHA1

                                                  089507466345fd00732c63b38f86891cf098b209

                                                  SHA256

                                                  1745859c77629cdfdb5d09f49ea9f50e26e4c759f5731d66371c747983c8db3b

                                                  SHA512

                                                  9e994db1416255ee1104178f6aebb02f50cb3602290c9aa500aa33da459f1fe22c46b3add6f2efe5d1cba4265b1effb2787cfbd7df56a1aa41229cd6f94fefae

                                                • C:\Users\Admin\AppData\Local\Temp\srun22.bat

                                                  Filesize

                                                  130B

                                                  MD5

                                                  2068f81db64efa2c0addc5c5f04062bb

                                                  SHA1

                                                  45b529e95515a0b05408c37f849f0483588b7679

                                                  SHA256

                                                  fe7e6528d14d25d1c51298397843c7ab4f80cf9e8470ce6ce8e43cbe100dc310

                                                  SHA512

                                                  547d8fe9b53627d0b488120e7222b494ef82d773939f03f883e9866866243d056b4f28ee70aa57321e1cf2f233df3baa26d4820bd6ddf71da0a6abcffa3fd135

                                                • C:\Users\Admin\AppData\Local\Temp\srun23.bat

                                                  Filesize

                                                  142B

                                                  MD5

                                                  5ad6f75364b081205f8a40146d92c834

                                                  SHA1

                                                  8ce72058872f25c8b2bc61f8df812da9efe36782

                                                  SHA256

                                                  27188be87dac6f24e0d843f5c934f84bfa45a6940c6ce16e9b4f1aed25fc05cd

                                                  SHA512

                                                  695120451c2dade152f224405054495a55822e25d387f3e90274e8d69cc5c54a86bcfbd8d1a2afa3414350c8afd15f310e0f721244d4c1bf6b250fa8506d5e23

                                                • C:\Users\Admin\AppData\Local\Temp\srun28.bat

                                                  Filesize

                                                  130B

                                                  MD5

                                                  6d68985b948a71aa2d1a268270796189

                                                  SHA1

                                                  31b720b43b9888b5a516d000161afaac3962fb3a

                                                  SHA256

                                                  5256e95b8bb2b1000aff4b45a7b193e3ea96dbb01815889d5c755c9d967d77d7

                                                  SHA512

                                                  4c2db44ccea9d0b7ff4dc065d6d3a33f9b2ae2c89cc4df424588c5f389d4a9720fe5fd8990737859a9fea85acb5a4bbfd50a1e475d44f977103b65ec83e65ba6

                                                • C:\Users\Admin\AppData\Local\Temp\srun35.bat

                                                  Filesize

                                                  130B

                                                  MD5

                                                  ce373fa45a4c40f6a5c8f88d679fe329

                                                  SHA1

                                                  a706b3c07debc6af288f3ac1ba465cd41c588cad

                                                  SHA256

                                                  08b9dea6e0663aab079027c116e7e477bb3adb1652eb5dc32a572c960fe60d84

                                                  SHA512

                                                  3bfb7d04260ceafb493fefe8ed659a2e4da306f364e1b8c1fdee6b9e83679c9aa35086f4286419fdbf43c64e9d9f40a607ea630694e00e73afe23943742c23bf

                                                • C:\Users\Admin\AppData\Local\Temp\srun4.bat

                                                  Filesize

                                                  190B

                                                  MD5

                                                  8d187f75952af7e91ffe93093b4a9f37

                                                  SHA1

                                                  3a2ffc3a08bea653cb33a04edfda0b662b00ca11

                                                  SHA256

                                                  cb507fad5b9fd8304084e79ad8033196f21010d48154300575f4b2ec96daf817

                                                  SHA512

                                                  e4549ce242dfa388e379802f997cdff7fc1f0cceaf6ba78db4e8c707c948de24c6f14071f40205b76993c2ea81fcc00a91fcaea88c892ce97eae9b987b6ea15f

                                                • C:\Users\Admin\AppData\Local\Temp\srun78.bat

                                                  Filesize

                                                  130B

                                                  MD5

                                                  92ee86cf26145fedafd7f330fdd13cc8

                                                  SHA1

                                                  cacbd0dbeac42bb809f0f38ca86d0a1e5b43ed4b

                                                  SHA256

                                                  b18cb51634ee73cf5bc491d18d1e3c5137467f6b3ee1f90f38239eca0cc52f1b

                                                  SHA512

                                                  f013b88bd23fe897ccb4a776d11cde59c03f7322b6dfeb7dacee114d84afc06cf6b402ff8ba94429d25834636a55c3ef2b2a786db8cb21717d79b1abdf71a891

                                                • C:\Users\Admin\AppData\Local\Temp\srun79.bat

                                                  Filesize

                                                  142B

                                                  MD5

                                                  f3604548216654d5946d0ec7ce1f02f1

                                                  SHA1

                                                  d89a8db51cb82b38d60a4a06541e2415e58e6501

                                                  SHA256

                                                  e9ab98443d34e06bde2e70fc7f5e9b61bedb3bcf9baad7cddb2597894537b831

                                                  SHA512

                                                  972eaa2ff6e26125ed8101ff48f436157bf61a91525e97c17d1ff724974efdee6f1025bfa4ae183de2d176e91b6f0993b4283ad3b2d68243be1780a79a706767

                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  5e60c365f2a26972c1b03159bf7716eb

                                                  SHA1

                                                  2acf91be8da43ae967b4e4535794e4e21183d58d

                                                  SHA256

                                                  b74fc86a403b11bb52d50506249d455e7f139b8b22e218e0591caa11f462f7ef

                                                  SHA512

                                                  a32aa82ce8b67e2f6cd4958be4e490b6d419834a0735dc0be5f08ca09c7bdba72979665085283ccfeb612728f8a7c83862291c9a9de743f1f9ed415805f9043a

                                                • C:\Users\Admin\Desktop\Internet Explorer.lnk

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  0d03fb02dba6530697485e267c277c21

                                                  SHA1

                                                  826992886fd6e20622590455a6e4bbc3e36cfa8f

                                                  SHA256

                                                  cbc505a647842b1e1f6f7ae2914732a2f4fa98cfb7b466744f49f9f5ee4c5546

                                                  SHA512

                                                  53da136ce1d1f8498b3bb3c6d93f0a21fdfc046b9ecdf6220a967804f6bfb285777c2758fd5affbe7ad5ac55dfa66008717f7445b34a4481bb74175252c780c3

                                                • memory/1640-7-0x0000000000400000-0x00000000004C4000-memory.dmp

                                                  Filesize

                                                  784KB

                                                • memory/1640-8-0x0000000000400000-0x00000000004C4000-memory.dmp

                                                  Filesize

                                                  784KB

                                                • memory/1640-14-0x0000000000400000-0x00000000004C4000-memory.dmp

                                                  Filesize

                                                  784KB

                                                • memory/1640-12-0x0000000000400000-0x00000000004C4000-memory.dmp

                                                  Filesize

                                                  784KB

                                                • memory/1640-11-0x0000000000400000-0x00000000004C4000-memory.dmp

                                                  Filesize

                                                  784KB

                                                • memory/1640-10-0x0000000000400000-0x00000000004C4000-memory.dmp

                                                  Filesize

                                                  784KB

                                                • memory/1640-9-0x0000000000400000-0x00000000004C4000-memory.dmp

                                                  Filesize

                                                  784KB

                                                • memory/1640-13-0x0000000000400000-0x00000000004C4000-memory.dmp

                                                  Filesize

                                                  784KB

                                                • memory/1640-0-0x0000000000230000-0x0000000000231000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1640-6-0x0000000000400000-0x00000000004C4000-memory.dmp

                                                  Filesize

                                                  784KB

                                                • memory/1640-5-0x0000000000400000-0x00000000004C4000-memory.dmp

                                                  Filesize

                                                  784KB

                                                • memory/1640-4-0x0000000000400000-0x00000000004C4000-memory.dmp

                                                  Filesize

                                                  784KB

                                                • memory/1640-3-0x0000000000230000-0x0000000000231000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/1640-2-0x0000000000400000-0x00000000004C4000-memory.dmp

                                                  Filesize

                                                  784KB

                                                • memory/1640-1-0x0000000000400000-0x00000000004C4000-memory.dmp

                                                  Filesize

                                                  784KB

                                                • memory/1640-116-0x0000000000400000-0x00000000004C4000-memory.dmp

                                                  Filesize

                                                  784KB