Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 22:20

General

  • Target

    3fac952b630046702142b8e34e0a098f.exe

  • Size

    648KB

  • MD5

    3fac952b630046702142b8e34e0a098f

  • SHA1

    820bd391b5006861f29deb848783af5f11c69868

  • SHA256

    118f3e5ff6de52851a3615116a5580dceee6c564b11456850617e7c95337ad57

  • SHA512

    4e7f544d7e7d6d9552f2e35051998478031c8bb0949ec3406d864a45e9fa629e22f84d62529da3512503235c44df3126ad417b48c08866024b811d8d5fcfa746

  • SSDEEP

    12288:VAll8Fs2pPcx5AL6AnR9SUCnp4XS3h1GvLzZUBlG7BX4uUb:VAlqVPcHq609LqKSR1QZte

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fac952b630046702142b8e34e0a098f.exe
    "C:\Users\Admin\AppData\Local\Temp\3fac952b630046702142b8e34e0a098f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Users\Admin\AppData\Local\Temp\1430995618.exe
      C:\Users\Admin\AppData\Local\Temp\1430995618.exe 3,9,7,8,2,0,1,9,3,3,5 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3844
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 660
        3⤵
        • Program crash
        PID:2208
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81703627900.txt bios get serialnumber
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1196
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81703627900.txt bios get version
    1⤵
      PID:3320
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic /output:C:\Users\Admin\AppData\Local\Temp\81703627900.txt bios get version
      1⤵
        PID:3676
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703627900.txt bios get version
        1⤵
          PID:3404
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703627900.txt bios get version
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:768
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3844 -ip 3844
          1⤵
            PID:3032

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\1430995618.exe

            Filesize

            58KB

            MD5

            db5a68429a65e5f7bb3c02e8efa9491a

            SHA1

            6df842beb8fb2b943ca88b59a234a90bb6439f87

            SHA256

            6d489aee4e9c59284f9a13fc761b7293804c02d87591ecf14f08c4596da70a4f

            SHA512

            f7d4c8f83ba3df344971698e1a3f69ac15aba38f1230629a1ef9d44474ea9b851f841400f6e7b740d815e07caaa3640d7e200c86b2f7ad9f19139590b109e19e

          • C:\Users\Admin\AppData\Local\Temp\1430995618.exe

            Filesize

            74KB

            MD5

            3b6a939754b2e5964b9b8851b7a29e62

            SHA1

            6e2e851cfe372b4d38545b3b14737e8aa34685d1

            SHA256

            b25fbf68eb7128b5b5f8720a2d04cc1ade392185b16e3afafc728718baa4c6f0

            SHA512

            cd93f34dc80d9582752e09d90a14b71aa5ccfd83549e01f11d780154e25ce3d1d5b06b98ed39faefc11bd37d64926841d99b9eddf694f91fb065c84bb37e6584

          • C:\Users\Admin\AppData\Local\Temp\81703627900.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81703627900.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\81703627900.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\nsh594C.tmp\hwkqgss.dll

            Filesize

            140KB

            MD5

            987d0509870f39ab2fa48778f85460f3

            SHA1

            7eeaf535b33ac2cea0666a2d80e7b9dc1505a13b

            SHA256

            249849c254b818c543932d5387df98f86670fcc3c0d29ad575999056e4fc57d5

            SHA512

            d7da9bc3118510dec686de4dd74746c806525f5e0cc4004334c1817b674faa06cf9130ce6ce88f46dbcb95db16f60aa6130865106d2333a3d007fa2479980457

          • C:\Users\Admin\AppData\Local\Temp\nsh594C.tmp\hwkqgss.dll

            Filesize

            15KB

            MD5

            ef6a701eae91a002f28e7e9edd7cfa4b

            SHA1

            719143ef03748aaf3bbbf6c61c48d4bba7411e68

            SHA256

            3da16146a1b8bb698c9ac84916d011191ba5f1b59496bb0c9cf42372fb130f4f

            SHA512

            25765850d18164cf1795ef5465796cb20e8ffa6abc1253be3ac645be9ae6a6b543c7ba87e5ef4359597fadd06a3010967dabf4aa32c191bfd84213f8f6e2a301

          • C:\Users\Admin\AppData\Local\Temp\nsh594C.tmp\nsisunz.dll

            Filesize

            40KB

            MD5

            5f13dbc378792f23e598079fc1e4422b

            SHA1

            5813c05802f15930aa860b8363af2b58426c8adf

            SHA256

            6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

            SHA512

            9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

          • C:\Users\Admin\AppData\Local\Temp\nsh594C.tmp\nsisunz.dll

            Filesize

            17KB

            MD5

            c2746075bcc5289fe394723fa9d20423

            SHA1

            c67fb8f4b528e4a838bfad45a1223e68490f7f36

            SHA256

            e30cd389775647fad36c96c511bf8f66942c283898c1164cb1d200693e3eb358

            SHA512

            54436914245a0675dcede92abac1b87ed3973c0722ffa6e7645423f661459691842892af78ba6f4af581b060280d998a918da53df31beb382762adae4dd0fb42