Analysis

  • max time kernel
    67s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 23:56

General

  • Target

    44a9a4aab2226603cc8ad4d81dc299fa.exe

  • Size

    2.5MB

  • MD5

    44a9a4aab2226603cc8ad4d81dc299fa

  • SHA1

    ea9219503ca35162bec9304210f77f13c77fd176

  • SHA256

    79f736fc40140c0c94b2da2ec99a437ad827adec22af45ecb8a9af924fa4a739

  • SHA512

    e2d02c2f73b7dede45c97630fef051b118ffba012c2e5c45a590bd96e2281fe7acf3bccf0dfbbfba0dc386daa10ed1dbdbcfa2c050d05c8199dd771a3da5a2d0

  • SSDEEP

    49152:rx+1KHkoWgtR4BY8Z9oTIAdjLLnuPh0wkNQjYiGKmXAvWMPbD67aSZcXw7T7e:rxuekByRGKdjLDuZ0wJjNIMWMPS7Biwy

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44a9a4aab2226603cc8ad4d81dc299fa.exe
    "C:\Users\Admin\AppData\Local\Temp\44a9a4aab2226603cc8ad4d81dc299fa.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\AppData\Local\Temp\nsg4A77.tmp\CfosSpeed 4.50 .silverado96..exe
      "C:\Users\Admin\AppData\Local\Temp\nsg4A77.tmp\CfosSpeed 4.50 .silverado96..exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Users\Admin\AppData\Local\Temp\nsm4AE5.tmp\CfosSpeed 4.50 .silverado96..exe
        "C:\Users\Admin\AppData\Local\Temp\nsm4AE5.tmp\CfosSpeed 4.50 .silverado96..exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4136
        • C:\Users\Admin\AppData\Local\Temp\$cfsfx.0\setup.exe
          "C:\Users\Admin\AppData\Local\Temp\$cfsfx.0\setup.exe" -parentdir:"C:\Users\Admin\AppData\Local\Temp\nsm4AE5.tmp\"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          PID:3952
      • C:\Users\Admin\AppData\Local\Temp\nsm4AE5.tmp\Server.exe
        C:\Users\Admin\AppData\Local\Temp\nsm4AE5.tmp\Server.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2188
    • C:\Users\Admin\AppData\Local\Temp\nsg4A77.tmp\Server.exe
      C:\Users\Admin\AppData\Local\Temp\nsg4A77.tmp\Server.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3776
  • C:\Windows\SysWOW64\reg.exe
    reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v WinsysMon /t REG_SZ /d "C:\Windows\SysWOW64\Socks.exe" /f
    1⤵
    • Adds Run key to start application
    • Modifies registry key
    PID:3440
  • C:\Windows\SysWOW64\net1.exe
    C:\Windows\system32\net1 stop wscsvc
    1⤵
      PID:3196
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\hi.bat
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1744
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall set service type = upnp mode = enable
      1⤵
      • Modifies Windows Firewall
      PID:2636
    • C:\Windows\SysWOW64\net.exe
      net stop wscsvc
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3740
    • C:\Windows\SysWOW64\Socks.exe
      C:\Windows\system32\Socks.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2552
    • C:\Windows\SysWOW64\Socks.exe
      C:\Windows\system32\Socks.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:364

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nsg4A77.tmp\CfosSpeed 4.50 .silverado96..exe

      Filesize

      92KB

      MD5

      ac8855856a867aefce59e4f40307e969

      SHA1

      79f93c61d9b66a701ab369d13e112d7d3ed5491a

      SHA256

      4d149b06378fc38e99cc3c244941d79cbfb2c2917085945b6240aecabaf151a6

      SHA512

      c5b1c3f018186214c68d5e57a27a2e9790a343fa62ce959577026202a441030c4819498aebcea365f817e736f1b54c245ab5a89532232e498887748ea59c4643