Analysis

  • max time kernel
    147s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 19:25 UTC

General

  • Target

    0d4cbe904f7fb860570201e590346b7a.exe

  • Size

    219KB

  • MD5

    0d4cbe904f7fb860570201e590346b7a

  • SHA1

    2fcdb7616591704861d177b5c0e3ade12de03d6b

  • SHA256

    e11d974e59927cda7c8e614688afdc8cb3ab4942fb9a2bb86c686c4b24f5b9e6

  • SHA512

    04866155ca76dc94872f9121536210e93bbb82d77c36be55d0dffa6a07ec73257439c314559586951f1dc1d392b4133e9778365d08e84c8547a99bc5ef1ee9c3

  • SSDEEP

    6144:iPNeevOaGWpxcl/NdzFWE++GzB64/K7Hou:SEYOaG/zFWxvBD/

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d4cbe904f7fb860570201e590346b7a.exe
    "C:\Users\Admin\AppData\Local\Temp\0d4cbe904f7fb860570201e590346b7a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2096 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\0d4cbe904f7fb860570201e590346b7a.exe" & start C:\Users\Admin\AppData\Local\etwmoka.exe -f
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /pid 2096
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2716
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 3 127.1
        3⤵
        • Runs ping.exe
        PID:2696
      • C:\Users\Admin\AppData\Local\etwmoka.exe
        C:\Users\Admin\AppData\Local\etwmoka.exe -f
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\etwmoka.exe

    Filesize

    219KB

    MD5

    0d4cbe904f7fb860570201e590346b7a

    SHA1

    2fcdb7616591704861d177b5c0e3ade12de03d6b

    SHA256

    e11d974e59927cda7c8e614688afdc8cb3ab4942fb9a2bb86c686c4b24f5b9e6

    SHA512

    04866155ca76dc94872f9121536210e93bbb82d77c36be55d0dffa6a07ec73257439c314559586951f1dc1d392b4133e9778365d08e84c8547a99bc5ef1ee9c3

  • memory/2096-1-0x0000000001000000-0x00000000010C6000-memory.dmp

    Filesize

    792KB

  • memory/2096-2-0x0000000000460000-0x0000000000560000-memory.dmp

    Filesize

    1024KB

  • memory/2096-3-0x0000000000230000-0x0000000000232000-memory.dmp

    Filesize

    8KB

  • memory/2096-5-0x0000000001000000-0x00000000010C6000-memory.dmp

    Filesize

    792KB

  • memory/2940-17-0x0000000001000000-0x00000000010C6000-memory.dmp

    Filesize

    792KB

  • memory/2940-12-0x0000000000230000-0x0000000000232000-memory.dmp

    Filesize

    8KB

  • memory/2940-16-0x0000000001000000-0x00000000010C6000-memory.dmp

    Filesize

    792KB

  • memory/2940-11-0x00000000004A0000-0x00000000005A0000-memory.dmp

    Filesize

    1024KB

  • memory/2940-18-0x0000000001000000-0x00000000010C6000-memory.dmp

    Filesize

    792KB

  • memory/2940-19-0x00000000004A0000-0x00000000005A0000-memory.dmp

    Filesize

    1024KB

  • memory/2940-20-0x0000000000230000-0x0000000000232000-memory.dmp

    Filesize

    8KB

  • memory/2940-21-0x0000000001000000-0x00000000010C6000-memory.dmp

    Filesize

    792KB

  • memory/2940-23-0x0000000001000000-0x00000000010C6000-memory.dmp

    Filesize

    792KB

  • memory/2940-24-0x0000000001000000-0x00000000010C6000-memory.dmp

    Filesize

    792KB

  • memory/2940-25-0x0000000001000000-0x00000000010C6000-memory.dmp

    Filesize

    792KB

  • memory/2940-26-0x0000000001000000-0x00000000010C6000-memory.dmp

    Filesize

    792KB

  • memory/2940-27-0x0000000001000000-0x00000000010C6000-memory.dmp

    Filesize

    792KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.