Analysis

  • max time kernel
    52s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 00:07

General

  • Target

    1bbbbc82d10f76fb55e59db6ef5a9646.exe

  • Size

    27KB

  • MD5

    1bbbbc82d10f76fb55e59db6ef5a9646

  • SHA1

    960c9c18f6331aa7c8456697558547b1a14ea45d

  • SHA256

    715407f67e1d86df046811c6953cc1ac107bc0b56a0ee946addd88eb974f70c0

  • SHA512

    5f2896483349c8619acebe7d21b8cc8790a15944c6d41d17ef3d891b6487b43d2ce4c5ea8acc9912a910f56543566a4d32f8d925ad9ddb74abfcdc20590d211a

  • SSDEEP

    768:liNvieDmMeGcJSi5YJ64xCbNBX5M2Z21b/hQdvZi5Wj1F0:MNRD0G+G6oCbNBBZkhQdvZi5WP0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 16 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bbbbc82d10f76fb55e59db6ef5a9646.exe
    "C:\Users\Admin\AppData\Local\Temp\1bbbbc82d10f76fb55e59db6ef5a9646.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Windows\SysWOW64\wbem\csrss.exe
      C:\Windows\system32\wbem\csrss.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4512
      • C:\Windows\SysWOW64\wbem\csrss.exe
        C:\Windows\system32\wbem\csrss.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5000
        • C:\Windows\SysWOW64\wbem\csrss.exe
          C:\Windows\system32\wbem\csrss.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3300
          • C:\Windows\SysWOW64\wbem\csrss.exe
            C:\Windows\system32\wbem\csrss.exe
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1752
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
              6⤵
                PID:2784
              • C:\Windows\SysWOW64\wbem\csrss.exe
                C:\Windows\system32\wbem\csrss.exe
                6⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3972
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                  7⤵
                    PID:2496
                  • C:\Windows\SysWOW64\wbem\csrss.exe
                    C:\Windows\system32\wbem\csrss.exe
                    7⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1932
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                      8⤵
                        PID:5008
                      • C:\Windows\SysWOW64\wbem\csrss.exe
                        C:\Windows\system32\wbem\csrss.exe
                        8⤵
                          PID:636
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                            9⤵
                              PID:2320
                            • C:\Windows\SysWOW64\wbem\csrss.exe
                              C:\Windows\system32\wbem\csrss.exe
                              9⤵
                                PID:4292
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                  10⤵
                                    PID:2560
                                  • C:\Windows\SysWOW64\wbem\csrss.exe
                                    C:\Windows\system32\wbem\csrss.exe
                                    10⤵
                                      PID:4904
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                        11⤵
                                          PID:548
                                        • C:\Windows\SysWOW64\wbem\csrss.exe
                                          C:\Windows\system32\wbem\csrss.exe
                                          11⤵
                                            PID:3880
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                              12⤵
                                                PID:4908
                                              • C:\Windows\SysWOW64\wbem\csrss.exe
                                                C:\Windows\system32\wbem\csrss.exe
                                                12⤵
                                                  PID:1524
                                                  • C:\Windows\SysWOW64\wbem\csrss.exe
                                                    C:\Windows\system32\wbem\csrss.exe
                                                    13⤵
                                                      PID:4800
                                                      • C:\Windows\SysWOW64\wbem\csrss.exe
                                                        C:\Windows\system32\wbem\csrss.exe
                                                        14⤵
                                                          PID:4308
                                                          • C:\Windows\SysWOW64\wbem\csrss.exe
                                                            C:\Windows\system32\wbem\csrss.exe
                                                            15⤵
                                                              PID:1156
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                                                16⤵
                                                                  PID:4864
                                                                • C:\Windows\SysWOW64\wbem\csrss.exe
                                                                  C:\Windows\system32\wbem\csrss.exe
                                                                  16⤵
                                                                    PID:3212
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                                                  15⤵
                                                                    PID:3740
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                                                  14⤵
                                                                    PID:1208
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                                                  13⤵
                                                                    PID:5056
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                                    5⤵
                                                      PID:2268
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                                    4⤵
                                                      PID:3060
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                                    3⤵
                                                      PID:1476
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                                    2⤵
                                                      PID:4968
                                                  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                                                    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
                                                    1⤵
                                                      PID:3532
                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                      1⤵
                                                      • Modifies Internet Explorer settings
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SetWindowsHookEx
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:1560
                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1560 CREDAT:17410 /prefetch:2
                                                        2⤵
                                                        • Modifies Internet Explorer settings
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2020
                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                      1⤵
                                                      • Modifies Internet Explorer settings
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SetWindowsHookEx
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:4452
                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4452 CREDAT:17410 /prefetch:2
                                                        2⤵
                                                        • Modifies Internet Explorer settings
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1528
                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                      1⤵
                                                        PID:3488
                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3488 CREDAT:17410 /prefetch:2
                                                          2⤵
                                                            PID:1448
                                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                                          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                          1⤵
                                                            PID:1136
                                                            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1136 CREDAT:17410 /prefetch:2
                                                              2⤵
                                                                PID:5020
                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                              "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                              1⤵
                                                                PID:1300
                                                                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1300 CREDAT:17410 /prefetch:2
                                                                  2⤵
                                                                    PID:4808
                                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                                  "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                                  1⤵
                                                                    PID:3648
                                                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3648 CREDAT:17410 /prefetch:2
                                                                      2⤵
                                                                        PID:4464
                                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                                      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                                      1⤵
                                                                        PID:4512
                                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4512 CREDAT:17410 /prefetch:2
                                                                          2⤵
                                                                            PID:3544

                                                                        Network

                                                                              MITRE ATT&CK Enterprise v15

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BJCNBC62\NewErrorPageTemplate[1]

                                                                                Filesize

                                                                                1KB

                                                                                MD5

                                                                                dfeabde84792228093a5a270352395b6

                                                                                SHA1

                                                                                e41258c9576721025926326f76063c2305586f76

                                                                                SHA256

                                                                                77b138ab5d0a90ff04648c26addd5e414cc178165e3b54a4cb3739da0f58e075

                                                                                SHA512

                                                                                e256f603e67335151bb709294749794e2e3085f4063c623461a0b3decbcca8e620807b707ec9bcbe36dcd7d639c55753da0495be85b4ae5fb6bfc52ab4b284fd

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\down[1]

                                                                                Filesize

                                                                                748B

                                                                                MD5

                                                                                c4f558c4c8b56858f15c09037cd6625a

                                                                                SHA1

                                                                                ee497cc061d6a7a59bb66defea65f9a8145ba240

                                                                                SHA256

                                                                                39e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781

                                                                                SHA512

                                                                                d60353d3fbea2992d96795ba30b20727b022b9164b2094b922921d33ca7ce1634713693ac191f8f5708954544f7648f4840bcd5b62cb6a032ef292a8b0e52a44

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\errorPageStrings[1]

                                                                                Filesize

                                                                                4KB

                                                                                MD5

                                                                                d65ec06f21c379c87040b83cc1abac6b

                                                                                SHA1

                                                                                208d0a0bb775661758394be7e4afb18357e46c8b

                                                                                SHA256

                                                                                a1270e90cea31b46432ec44731bf4400d22b38eb2855326bf934fe8f1b169a4f

                                                                                SHA512

                                                                                8a166d26b49a5d95aea49bc649e5ea58786a2191f4d2adac6f5fbb7523940ce4482d6a2502aa870a931224f215cb2010a8c9b99a2c1820150e4d365cab28299e

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QSO8CY24\dnserror[1]

                                                                                Filesize

                                                                                2KB

                                                                                MD5

                                                                                2dc61eb461da1436f5d22bce51425660

                                                                                SHA1

                                                                                e1b79bcab0f073868079d807faec669596dc46c1

                                                                                SHA256

                                                                                acdeb4966289b6ce46ecc879531f85e9c6f94b718aab521d38e2e00f7f7f7993

                                                                                SHA512

                                                                                a88becb4fbddc5afc55e4dc0135af714a3eec4a63810ae5a989f2cecb824a686165d3cedb8cbd8f35c7e5b9f4136c29dea32736aabb451fe8088b978b493ac6d

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QSO8CY24\httpErrorPagesScripts[1]

                                                                                Filesize

                                                                                11KB

                                                                                MD5

                                                                                9234071287e637f85d721463c488704c

                                                                                SHA1

                                                                                cca09b1e0fba38ba29d3972ed8dcecefdef8c152

                                                                                SHA256

                                                                                65cc039890c7ceb927ce40f6f199d74e49b8058c3f8a6e22e8f916ad90ea8649

                                                                                SHA512

                                                                                87d691987e7a2f69ad8605f35f94241ab7e68ad4f55ad384f1f0d40dc59ffd1432c758123661ee39443d624c881b01dcd228a67afb8700fe5e66fc794a6c0384

                                                                              • C:\Users\Admin\AppData\Local\Temp\temp.bat

                                                                                Filesize

                                                                                232B

                                                                                MD5

                                                                                d660babbde3280a78076e7398277e217

                                                                                SHA1

                                                                                fbf50b16a3dc2192ff944dc9fa3cf5b21deafd21

                                                                                SHA256

                                                                                4fdabfe4f6906c981d0cf252b85bfe35e87cf7fff36afb6c49ffff5d187e3fbe

                                                                                SHA512

                                                                                47ee63d62ee6e8b10c4bf83dcd575c834861a2e9c8d3f5b8e7aa9ac04a788a8581363c1d623cda867b428b0eeda1bbb182f6ebf9c19156ad24d24b7c6b99f121

                                                                              • C:\Users\Admin\AppData\Local\Temp\temp.bat

                                                                                Filesize

                                                                                160B

                                                                                MD5

                                                                                688de2c11d07cd1a0f0a22aaba2f38fe

                                                                                SHA1

                                                                                c693ee247172adf49b1fe68c597358b0e0e2477e

                                                                                SHA256

                                                                                8fd8370941a44a938f35789dae430fe4ee8bb1443f05baad544b48c261ae40d7

                                                                                SHA512

                                                                                d1ecc15e5e1da8d9f35f95ed2b66763ed314e9b523dacd1eb42332b8f3d9c8256f46830c7b9c107ada42cc51d4dfe6ac9cd845b6fdbcf25677c5c50b138bde0a

                                                                              • C:\Users\Admin\AppData\Local\Temp\~DF90205ED1B58D9DDD.TMP

                                                                                Filesize

                                                                                16KB

                                                                                MD5

                                                                                a71db28c9a8cb623d33bca8a548e808e

                                                                                SHA1

                                                                                944f1645eafb79c63ffb1f4638dc73c6753d9eef

                                                                                SHA256

                                                                                557a41e01980adb1d13d7f8db657ef8f69ec73408afd3f64b73dcf46c5d755b9

                                                                                SHA512

                                                                                aafd2ae6427e958aa0e50e984073227dc7ddb985976c84538555bb2d7583c979ddb25e65b26d534a1658909c5b9f2f7db9b74e11929f5f92b04afa6fef0b2eb2

                                                                              • C:\Windows\SysWOW64\n.ini

                                                                                Filesize

                                                                                19B

                                                                                MD5

                                                                                e415f059d8566da0d8d44108e0e915fe

                                                                                SHA1

                                                                                34dff1c646f465308c2804f0f046bbdcdfb53661

                                                                                SHA256

                                                                                b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782

                                                                                SHA512

                                                                                fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b

                                                                              • C:\Windows\SysWOW64\wbem\csrss.exe

                                                                                Filesize

                                                                                26KB

                                                                                MD5

                                                                                59f5beb8d19f33e36da97078110eb201

                                                                                SHA1

                                                                                9d8359c56fed22ad55afd3787c5209ac875baec3

                                                                                SHA256

                                                                                936de229673f930dc6c60d3cdf6c582bd51914ca41177310995b57552a560703

                                                                                SHA512

                                                                                a7d43235c5918fac117835b15425b57bc1b6876b85e7cce5e28f92600394b61e591962e88f0f54deecf59aa5174b5d2c14df9f386d7adccff8c4f10c2800dcf1

                                                                              • C:\Windows\SysWOW64\wbem\csrss.exe

                                                                                Filesize

                                                                                27KB

                                                                                MD5

                                                                                1bbbbc82d10f76fb55e59db6ef5a9646

                                                                                SHA1

                                                                                960c9c18f6331aa7c8456697558547b1a14ea45d

                                                                                SHA256

                                                                                715407f67e1d86df046811c6953cc1ac107bc0b56a0ee946addd88eb974f70c0

                                                                                SHA512

                                                                                5f2896483349c8619acebe7d21b8cc8790a15944c6d41d17ef3d891b6487b43d2ce4c5ea8acc9912a910f56543566a4d32f8d925ad9ddb74abfcdc20590d211a

                                                                              • memory/1524-236-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                Filesize

                                                                                108KB

                                                                              • memory/3212-359-0x00000000005B0000-0x00000000005B2000-memory.dmp

                                                                                Filesize

                                                                                8KB

                                                                              • memory/3604-25-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                Filesize

                                                                                108KB

                                                                              • memory/3604-0-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                Filesize

                                                                                108KB

                                                                              • memory/3604-12-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                Filesize

                                                                                108KB

                                                                              • memory/3604-1-0x0000000000B50000-0x0000000000B52000-memory.dmp

                                                                                Filesize

                                                                                8KB

                                                                              • memory/3880-223-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                Filesize

                                                                                108KB

                                                                              • memory/4512-26-0x0000000000570000-0x0000000000572000-memory.dmp

                                                                                Filesize

                                                                                8KB

                                                                              • memory/5000-65-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                Filesize

                                                                                108KB

                                                                              • memory/5000-47-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                Filesize

                                                                                108KB