Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 04:48

General

  • Target

    060eef088a44cca9f650fdcd2d6d79b0.exe

  • Size

    149KB

  • MD5

    060eef088a44cca9f650fdcd2d6d79b0

  • SHA1

    3d5f963998ac2eb0bb55c222ce56d7477d562236

  • SHA256

    5d6c88f368093afd6f79540fbd259804c62c6238b2fe9d529b467a0020957d46

  • SHA512

    a217a7f19c29a47ad437843f103df8afaddfea9dc64cef8b6bc4682de859d0d1085f9f2bd5c195902d1babbc78c446aee37437ddc7535fd6d77c2fe4397a2c35

  • SSDEEP

    3072:+1YEPRoip3YDYvJPbHVYOY1dZaioWEZHoj4sVf3qGba6Em:QYAyeIDYvJPbaO4DaiLyHSb/ban

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe
    "C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe
      "C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe
        "C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2884
        • C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe
          "C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2500
          • C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe
            "C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1960
            • C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe
              "C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2636
              • C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe
                "C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1240
                • C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe
                  "C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2056
                  • C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe
                    "C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"
                    9⤵
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:620
                    • C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe
                      "C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"
                      10⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1268

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/620-27-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/620-28-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/1240-21-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/1240-22-0x0000000000AD0000-0x0000000000B50000-memory.dmp

          Filesize

          512KB

        • memory/1240-23-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/1268-29-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/1960-17-0x000000001A870000-0x000000001A8F0000-memory.dmp

          Filesize

          512KB

        • memory/1960-16-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/1960-18-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/2056-24-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/2056-26-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/2056-25-0x000000001AC80000-0x000000001AD00000-memory.dmp

          Filesize

          512KB

        • memory/2232-0-0x0000000000B80000-0x0000000000BAC000-memory.dmp

          Filesize

          176KB

        • memory/2232-5-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/2232-2-0x000000001AE90000-0x000000001AF10000-memory.dmp

          Filesize

          512KB

        • memory/2232-3-0x0000000000380000-0x0000000000396000-memory.dmp

          Filesize

          88KB

        • memory/2232-4-0x0000000000410000-0x000000000041C000-memory.dmp

          Filesize

          48KB

        • memory/2232-1-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/2348-8-0x000000001AEB0000-0x000000001AF30000-memory.dmp

          Filesize

          512KB

        • memory/2348-9-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/2348-7-0x00000000005E0000-0x00000000005F6000-memory.dmp

          Filesize

          88KB

        • memory/2348-6-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/2500-15-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/2500-14-0x000000001AF00000-0x000000001AF80000-memory.dmp

          Filesize

          512KB

        • memory/2500-13-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/2636-19-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/2636-20-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/2884-12-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB

        • memory/2884-11-0x0000000000B00000-0x0000000000B80000-memory.dmp

          Filesize

          512KB

        • memory/2884-10-0x000007FEF5320000-0x000007FEF5D0C000-memory.dmp

          Filesize

          9.9MB