Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 16:23

General

  • Target

    057748a33b8ea8d62cc6b8d4ff6cd55e.exe

  • Size

    581KB

  • MD5

    057748a33b8ea8d62cc6b8d4ff6cd55e

  • SHA1

    7188a760c14f53efc09ab71eaa2f03e8dc985c31

  • SHA256

    6bee7985d657d7bd67af472aeaf187770bc322fde9857122f7f6cc0277d8174c

  • SHA512

    162fa9100e03145f7dca48b683391f849dbd7d90d0c105de17ca80deb8d745c21ae36cbd274a624e9075b8f46b42674f3a6b66934ae86448b7e0408c216c171c

  • SSDEEP

    12288:UqrLOfbfw892zPjQ6BVfCrvjHaQqMETxfPGa7znERAXl8ifyNLy:UqGTliDwrvba8Elh7rxlHKu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\057748a33b8ea8d62cc6b8d4ff6cd55e.exe
    "C:\Users\Admin\AppData\Local\Temp\057748a33b8ea8d62cc6b8d4ff6cd55e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4424
    • C:\Users\Admin\AppData\Local\Temp\1431799351.exe
      C:\Users\Admin\AppData\Local\Temp\1431799351.exe 9^4^5^4^4^6^8^9^2^9^1 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3500
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703461142.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1420
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703461142.txt bios get version
        3⤵
          PID:2324
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703461142.txt bios get version
          3⤵
            PID:2216
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 956
            3⤵
            • Program crash
            PID:4912
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81703461142.txt bios get version
            3⤵
              PID:956
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              wmic /output:C:\Users\Admin\AppData\Local\Temp\81703461142.txt bios get version
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:960
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3500 -ip 3500
          1⤵
            PID:820

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\1431799351.exe

            Filesize

            254KB

            MD5

            760d1317cfbe52d74083791cb16e64ca

            SHA1

            02a0c385fc72b390b4787808dae2097953583310

            SHA256

            fb210c1f3fc02b6bc07aa1ff80216f0f47045f086b26d7340c7c9a37a189deb2

            SHA512

            0b101b94a7ad5f53586f9779ceb1cf1b75e6e36d9efeed68303f7666d3dd5c2fd1c9273f723d2f6847ad719572b591a6de1d352ce603b17cd1be6ab3342d2d7f

          • C:\Users\Admin\AppData\Local\Temp\1431799351.exe

            Filesize

            95KB

            MD5

            f08eff504d551b588c9569d61a441b9b

            SHA1

            6ab1201a227905002493436d273f484d03a4be2b

            SHA256

            07e72d14d1d85ca1b1ad062e435bb41a0964f011e52fd7e72018ae42c51d40fc

            SHA512

            83177ab1950329b14342b1839a0a85d821e2e579ee23951218c0da84c85f3dc08d83768921587d5749a1187f546c156593e20f9df7a2ed5bf7a609b4ffaa31b3

          • C:\Users\Admin\AppData\Local\Temp\81703461142.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81703461142.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\81703461142.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\nsq49CB.tmp\ibbbywk.dll

            Filesize

            153KB

            MD5

            0ec43130a05cbe9a126c50efc3d2771d

            SHA1

            360e4dd81a32aecd3fb4cab67b8cc786f41fa2dd

            SHA256

            f1f2d35cd64a8b1faf3bb5260d2d18b5e1c22b28b4c9b30a215bd39b626d77ed

            SHA512

            d2d19dfc18051fab5f449b071206d9d5a73d41d8b7e91e42056de20ae0208d8b957272d068f5e2b12faefd2b3456874dd2f682b14f505a6d5cec9d44781f5b14

          • C:\Users\Admin\AppData\Local\Temp\nsq49CB.tmp\ibbbywk.dll

            Filesize

            84KB

            MD5

            db5be5483d76608f5d9d76980a7e3501

            SHA1

            259d93ef1c490444ad26e9d4a7839b6b1690577c

            SHA256

            6c4a6afc58f4926c496efb212eb80141a68e288f47ff9fc8c69bcd45d21922cd

            SHA512

            71cbdd9d236b49504c6c88a1b05ec9ef823ad5b123dba9d5c40e3bebde97a652f87260fbe700839cd775ef0c89894b4e38956ddebe1371d1ec46a5e9171ec5d6

          • C:\Users\Admin\AppData\Local\Temp\nsq49CB.tmp\nsisunz.dll

            Filesize

            40KB

            MD5

            5f13dbc378792f23e598079fc1e4422b

            SHA1

            5813c05802f15930aa860b8363af2b58426c8adf

            SHA256

            6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

            SHA512

            9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5