Analysis

  • max time kernel
    0s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 03:59

General

  • Target

    04525d2b339cced16d8e8db425832f17.exe

  • Size

    695KB

  • MD5

    04525d2b339cced16d8e8db425832f17

  • SHA1

    d2d37a3a624d6e972f7eafb00b0be5e8eaff14f4

  • SHA256

    ac2347aa0ce70e6a961c8082cb5a7bd23dd8a7b1c34a6042b77495a1a24b93e0

  • SHA512

    99caf4477cbe2ebb7aff224a9824affcad035ea688ad1fd2ce2b755c6901cc921dc6d5aee36e2d1a6b5bafd1cf52780060bbf68c1c0fe740c72d68b6d0d7ea83

  • SSDEEP

    12288:cy10sFhMkrtozE0Eyw3d7TKwntjhkR/4opVhJTHTKQH9jp3rzFR:cy1Rh3tozXwzntWZLjJjWwpn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 60 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04525d2b339cced16d8e8db425832f17.exe
    "C:\Users\Admin\AppData\Local\Temp\04525d2b339cced16d8e8db425832f17.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Local\Temp\1432274520.exe
      C:\Users\Admin\AppData\Local\Temp\1432274520.exe 0^4^8^4^1^0^3^2^2^1^9 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2328
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81703510847.txt bios get serialnumber
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2368
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81703510847.txt bios get version
    1⤵
      PID:2776
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 368
      1⤵
      • Program crash
      PID:1924
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic /output:C:\Users\Admin\AppData\Local\Temp\81703510847.txt bios get version
      1⤵
        PID:2512
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703510847.txt bios get version
        1⤵
          PID:2784
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703510847.txt bios get version
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2580

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads