Analysis

  • max time kernel
    52s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 15:32

General

  • Target

    03c6af974bee30079c26b1e255bfd914.exe

  • Size

    723KB

  • MD5

    03c6af974bee30079c26b1e255bfd914

  • SHA1

    18d04f489af097bb06d5044f86c0ed3b597c5cba

  • SHA256

    33e3c2ad2eb3ce0bdb4024b376f69ff5dd6ae3190bc80e6fc78b41df93f4d8f0

  • SHA512

    66bfb2e1de3f5575a2a1bbfa2662806b9a253f25cf8fa13ec59e6335a73f2c899ea675fe0f7547126c2b8e469ecee2636d53e2abdafa02e41b0db5791fb46a84

  • SSDEEP

    12288:fSgz373fkT1Aj4oA0T5pCtwvDAKNTZGjRmadIYKARuPt2lqQ+Zx6bgmks:f1373fkT84x0fCt2v/G1malKB2UQtbg9

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 8 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03c6af974bee30079c26b1e255bfd914.exe
    "C:\Users\Admin\AppData\Local\Temp\03c6af974bee30079c26b1e255bfd914.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\4STXSJGIO3.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\4STXSJGIO3.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2576
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\4STXSJGIO3.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\4STXSJGIO3.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2480
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
          PID:2432
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe:*:Enabled:Windows Messanger" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2580
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2440
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MsCtfMonitor.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MsCtfMonitor.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2604
        • C:\Users\Admin\AppData\Local\Temp\rtscom.exe
          "C:\Users\Admin\AppData\Local\Temp\rtscom.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          PID:2584
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
            4⤵
            • Suspicious use of SetWindowsHookEx
            PID:1952
    • C:\Windows\SysWOW64\reg.exe
      REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
      1⤵
      • Modifies firewall policy service
      • Modifies registry key
      PID:2524
    • C:\Windows\SysWOW64\reg.exe
      REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
      1⤵
      • Modifies firewall policy service
      • Modifies registry key
      PID:2836
    • C:\Windows\SysWOW64\reg.exe
      REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe:*:Enabled:Windows Messanger" /f
      1⤵
      • Modifies firewall policy service
      • Modifies registry key
      PID:2700

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rtscom.exe

      Filesize

      249KB

      MD5

      e3dc2ff43102eb6046df7a5b3466005c

      SHA1

      5c29bebfa030bd916172d122657aceed472d7fe7

      SHA256

      027077f2f4e95e6240c8af75b7da188a6fef1b16cec3426d2d87b5a4516a18b3

      SHA512

      09f24ed9ceda67ff1a11d5023e2c64e93207ae64c3e3a738dc15fe67a963953d17bb0f7bb619b6c61ed4caf555f62cd7bafde1b56870bcdec602ad08621e9c49

    • C:\Users\Admin\AppData\Local\Temp\rtscom.exe

      Filesize

      295KB

      MD5

      de66f0a63accb628ee27c01d7733e062

      SHA1

      812ce601f0f56d236c396dbea3f61003a1ab01e9

      SHA256

      99bd2ae2486533f0320189c5d0542bd77b98d800906abd17a61a5bf95102f30f

      SHA512

      d4e348e82455470472f03eaaca8ead6ccd678c3e730c5ec8dcc57f79bb83f827167fc1be841d4dbedd42bf14826ea447371c76d4171ebf5c84e344ad0eae36b7

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\MsCtfMonitor.exe

      Filesize

      8KB

      MD5

      e824048f3f9786d0546cc2c46ade94a5

      SHA1

      3ca156921fb9cb6419bee49ab63331048cf8a027

      SHA256

      55f2a0ca79087cfc2d8c59578f9625ba76809e39d8d9eb2a7f4010ab07c58315

      SHA512

      6892512a3729c00ca1e3cdeb4f2bdc91b36b256e3c4f883d2a3651edca5bced12ba0fbeba7d060080d60de074da712575438d19c2c03b79aea4320609801e5be

    • \Users\Admin\AppData\Local\Temp\rtscom.exe

      Filesize

      188KB

      MD5

      fb638466f45c4477c799b56d399a8df6

      SHA1

      471b2f844feaece4c9c9526ef82e21226a91202c

      SHA256

      2855ca7487a0717078ffcfbde7ca1c4a2ac27b7bd6aeff82fe5a596dcc8565ee

      SHA512

      9fe575adc34e71aafe0fe01d30ed62659bb5a1a583783fbeeb237ea783d66257eb75b75dd7e8cf843cb80449a596ae64487352e355c545307fc15213ccc3997d

    • memory/1680-1-0x0000000000970000-0x00000000009B0000-memory.dmp

      Filesize

      256KB

    • memory/1680-2-0x0000000074070000-0x000000007461B000-memory.dmp

      Filesize

      5.7MB

    • memory/1680-34-0x0000000000970000-0x00000000009B0000-memory.dmp

      Filesize

      256KB

    • memory/1680-33-0x0000000074070000-0x000000007461B000-memory.dmp

      Filesize

      5.7MB

    • memory/1680-0-0x0000000074070000-0x000000007461B000-memory.dmp

      Filesize

      5.7MB

    • memory/1952-56-0x0000000000401000-0x000000000046F000-memory.dmp

      Filesize

      440KB

    • memory/2484-15-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2484-40-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2484-7-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2484-20-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2484-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2484-11-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2484-9-0x0000000000400000-0x0000000000478000-memory.dmp

      Filesize

      480KB

    • memory/2584-38-0x0000000001E90000-0x0000000001ED0000-memory.dmp

      Filesize

      256KB

    • memory/2584-39-0x0000000074070000-0x000000007461B000-memory.dmp

      Filesize

      5.7MB

    • memory/2584-58-0x0000000001E90000-0x0000000001ED0000-memory.dmp

      Filesize

      256KB

    • memory/2584-59-0x0000000074070000-0x000000007461B000-memory.dmp

      Filesize

      5.7MB

    • memory/2584-60-0x0000000074070000-0x000000007461B000-memory.dmp

      Filesize

      5.7MB

    • memory/2604-29-0x0000000074070000-0x000000007461B000-memory.dmp

      Filesize

      5.7MB

    • memory/2604-37-0x0000000074070000-0x000000007461B000-memory.dmp

      Filesize

      5.7MB

    • memory/2604-42-0x0000000074070000-0x000000007461B000-memory.dmp

      Filesize

      5.7MB

    • memory/2604-41-0x00000000005B0000-0x00000000005F0000-memory.dmp

      Filesize

      256KB

    • memory/2604-57-0x0000000074070000-0x000000007461B000-memory.dmp

      Filesize

      5.7MB

    • memory/2604-28-0x00000000005B0000-0x00000000005F0000-memory.dmp

      Filesize

      256KB