Analysis

  • max time kernel
    107s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 06:05

General

  • Target

    0a484835e9ede7334f3f67966d5abd26.exe

  • Size

    742KB

  • MD5

    0a484835e9ede7334f3f67966d5abd26

  • SHA1

    be5df906bcb2f42bb1ca8c7a5708e4a0e3573676

  • SHA256

    7bfdab4a9b64d235b81bc868f6056e488319c0c14f02d3c7c3fd0e9b5d83c053

  • SHA512

    81bc316aa31d56eb8622848256ed1275babaa169349415b8284e712c45e9eca98a30cd49b44696b7b06840853d534d33c97d6035720d4a581c246f02c45fb098

  • SSDEEP

    12288:UFVKeWH/24s9igpM0h2Tm5PCkeEA1c2obY73uQMGL4r:neWH/bs0gq0UFk+ocTzm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a484835e9ede7334f3f67966d5abd26.exe
    "C:\Users\Admin\AppData\Local\Temp\0a484835e9ede7334f3f67966d5abd26.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hello.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hello.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\GUOCYOKl.BAT
        3⤵
          PID:1316
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hello.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hello.exe
        2⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:1608
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      1⤵
        PID:3084
      • C:\Windows\EntSver.exe
        C:\Windows\EntSver.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2684

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hello.exe

        Filesize

        298KB

        MD5

        9419975d520d1787b420b1076511bc3a

        SHA1

        58de806c239df4596799305bc55cebc0c957dc2f

        SHA256

        a4ee5cdd9d58fcf8ced2acb8a1aa92b6e5f894876432f3daf9f30df676c867cd

        SHA512

        b054507c5f2109f29129b55d70e95d69f4dfeeb54d7946dbfb8e853995678628a65cd99ebd980d0974016db41a7e7e38b58776e0db14bc550a0e32b6d97f5c7a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hello.exe

        Filesize

        87KB

        MD5

        1d663e07dcc68e742f3d36a20b879a0c

        SHA1

        9db2dbf3878929c0fd78663ed3e54a0b279356c4

        SHA256

        54b33a90efd7a65d7b00ad76391c75ac253f945b14d83abe16aa0c4eaa9ba7cc

        SHA512

        b17dd0794370006456b3b0fc6921fb68c799887cfbbc11c34e022f038a67458e6d37d1804a910966c8fcde04f9b56a14ae06aca42924a8a33046febb1f726d8c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hello.exe

        Filesize

        116KB

        MD5

        b5efca148ea723f1b333d496ee40ddc1

        SHA1

        9832a68e414e4a6f1d758829f624c5afd3b941d7

        SHA256

        6851548162687af66e698f9e315e156daf9b8ffe27391a87f3e6405949d4fc38

        SHA512

        60ab22b3bec914d46647345cb4a41b5513c8619f660bdbf93b241750431304a55d682338c2d6119b9e27cd4a4bef9e5a0f44184509fc70cb2f6d49c63d0ab170

      • C:\Windows\EntSver.exe

        Filesize

        495KB

        MD5

        6809867490c5e72804b2c87050224131

        SHA1

        87347e5fd135ea4a401d4a07cbee1117dd8f34fc

        SHA256

        037b75d659bdbcc49c319be346a43ca232af1e26a8bd7d6b1b0b2f78b9ee465d

        SHA512

        3029ab97d8f251a721df2068111303f4db925f29dc8ab7825f01d8f8b058cd66e72acadcd89150431546964e7293cf8ce672eeadc25e44ccbe0a53e0d27227d2

      • C:\Windows\EntSver.exe

        Filesize

        335KB

        MD5

        1a7e9a8f81e6e973f0b008a2c40a0766

        SHA1

        3d0a82b6d43dfdfee89bdced74a3e65b7ec9fc29

        SHA256

        254a51e9c98a355d97cd5150b53833cfe8a0b7e9beb4746a17ae418daadd0d79

        SHA512

        96572e73886e65b194cd010e6c80a9836517d12b82e16f67f61cba7290485eb3cd0ad0382431ed53d92d1d2c8fbf12193f4a5e42f26b204a9f0331d615e4e546

      • C:\Windows\GUOCYOKl.BAT

        Filesize

        158B

        MD5

        fd9a48b3dbdc1c2a9e4bf05e83ee810a

        SHA1

        e4e016ceaa3f06cbee89f4b6f29205a8dda0c0ff

        SHA256

        d4b5ea9ef731308584b41d502c61a4c5367fca3c228cb2a413662d4d540c99c7

        SHA512

        0cd2168df626ea4e4828dd4ae38571d838fa0ae15f9cf133b08646f872e233ff58ca170a3d760f03e115e76b06b73ef9d71effe0376f4c219d061bedd977e45d

      • memory/1044-41-0x0000000002650000-0x0000000002651000-memory.dmp

        Filesize

        4KB

      • memory/1044-37-0x0000000002610000-0x0000000002611000-memory.dmp

        Filesize

        4KB

      • memory/1044-67-0x0000000002E40000-0x0000000002E41000-memory.dmp

        Filesize

        4KB

      • memory/1044-66-0x0000000002E20000-0x0000000002E21000-memory.dmp

        Filesize

        4KB

      • memory/1044-65-0x0000000002AA0000-0x0000000002AA1000-memory.dmp

        Filesize

        4KB

      • memory/1044-64-0x0000000002A80000-0x0000000002A81000-memory.dmp

        Filesize

        4KB

      • memory/1044-63-0x0000000002A60000-0x0000000002A61000-memory.dmp

        Filesize

        4KB

      • memory/1044-62-0x0000000002A40000-0x0000000002A41000-memory.dmp

        Filesize

        4KB

      • memory/1044-61-0x0000000002A20000-0x0000000002A21000-memory.dmp

        Filesize

        4KB

      • memory/1044-60-0x00000000029D0000-0x00000000029D1000-memory.dmp

        Filesize

        4KB

      • memory/1044-59-0x00000000029A0000-0x00000000029A1000-memory.dmp

        Filesize

        4KB

      • memory/1044-58-0x0000000002850000-0x0000000002851000-memory.dmp

        Filesize

        4KB

      • memory/1044-57-0x0000000002860000-0x0000000002861000-memory.dmp

        Filesize

        4KB

      • memory/1044-56-0x0000000002830000-0x0000000002831000-memory.dmp

        Filesize

        4KB

      • memory/1044-55-0x0000000002840000-0x0000000002841000-memory.dmp

        Filesize

        4KB

      • memory/1044-54-0x0000000002810000-0x0000000002811000-memory.dmp

        Filesize

        4KB

      • memory/1044-53-0x0000000002820000-0x0000000002821000-memory.dmp

        Filesize

        4KB

      • memory/1044-52-0x00000000027E0000-0x00000000027E1000-memory.dmp

        Filesize

        4KB

      • memory/1044-51-0x00000000027F0000-0x00000000027F1000-memory.dmp

        Filesize

        4KB

      • memory/1044-50-0x00000000027C0000-0x00000000027C1000-memory.dmp

        Filesize

        4KB

      • memory/1044-49-0x00000000027D0000-0x00000000027D1000-memory.dmp

        Filesize

        4KB

      • memory/1044-48-0x00000000027A0000-0x00000000027A1000-memory.dmp

        Filesize

        4KB

      • memory/1044-47-0x00000000027B0000-0x00000000027B1000-memory.dmp

        Filesize

        4KB

      • memory/1044-46-0x0000000002680000-0x0000000002681000-memory.dmp

        Filesize

        4KB

      • memory/1044-45-0x0000000002690000-0x0000000002691000-memory.dmp

        Filesize

        4KB

      • memory/1044-44-0x0000000002660000-0x0000000002661000-memory.dmp

        Filesize

        4KB

      • memory/1044-43-0x0000000002670000-0x0000000002671000-memory.dmp

        Filesize

        4KB

      • memory/1044-42-0x0000000002640000-0x0000000002641000-memory.dmp

        Filesize

        4KB

      • memory/1044-69-0x0000000002E80000-0x0000000002E81000-memory.dmp

        Filesize

        4KB

      • memory/1044-40-0x0000000002620000-0x0000000002621000-memory.dmp

        Filesize

        4KB

      • memory/1044-39-0x0000000002630000-0x0000000002631000-memory.dmp

        Filesize

        4KB

      • memory/1044-38-0x0000000002600000-0x0000000002601000-memory.dmp

        Filesize

        4KB

      • memory/1044-68-0x0000000002E60000-0x0000000002E61000-memory.dmp

        Filesize

        4KB

      • memory/1044-36-0x00000000025E0000-0x00000000025E1000-memory.dmp

        Filesize

        4KB

      • memory/1044-70-0x0000000002EA0000-0x0000000002EA1000-memory.dmp

        Filesize

        4KB

      • memory/1044-35-0x00000000025F0000-0x00000000025F1000-memory.dmp

        Filesize

        4KB

      • memory/1044-34-0x00000000025C0000-0x00000000025C1000-memory.dmp

        Filesize

        4KB

      • memory/1044-33-0x00000000025D0000-0x00000000025D1000-memory.dmp

        Filesize

        4KB

      • memory/1044-29-0x00000000025B0000-0x00000000025B1000-memory.dmp

        Filesize

        4KB

      • memory/1044-28-0x0000000002580000-0x0000000002581000-memory.dmp

        Filesize

        4KB

      • memory/1044-27-0x00000000005B0000-0x00000000005B1000-memory.dmp

        Filesize

        4KB

      • memory/1044-26-0x00000000008D0000-0x00000000008D1000-memory.dmp

        Filesize

        4KB

      • memory/1044-25-0x00000000022F0000-0x0000000002333000-memory.dmp

        Filesize

        268KB

      • memory/1044-24-0x0000000000400000-0x00000000004F5000-memory.dmp

        Filesize

        980KB

      • memory/1044-30-0x00000000025A0000-0x00000000025A1000-memory.dmp

        Filesize

        4KB

      • memory/2240-10-0x0000000000A60000-0x0000000000A61000-memory.dmp

        Filesize

        4KB

      • memory/2240-4-0x0000000000560000-0x0000000000561000-memory.dmp

        Filesize

        4KB

      • memory/2240-20-0x0000000002A10000-0x0000000002A11000-memory.dmp

        Filesize

        4KB

      • memory/2240-17-0x0000000002A00000-0x0000000002A01000-memory.dmp

        Filesize

        4KB

      • memory/2240-16-0x00000000029D0000-0x00000000029D1000-memory.dmp

        Filesize

        4KB

      • memory/2240-15-0x00000000029E0000-0x00000000029E1000-memory.dmp

        Filesize

        4KB

      • memory/2240-14-0x00000000029F0000-0x00000000029F1000-memory.dmp

        Filesize

        4KB

      • memory/2240-12-0x0000000000190000-0x0000000000191000-memory.dmp

        Filesize

        4KB

      • memory/2240-3-0x0000000000C10000-0x0000000000C11000-memory.dmp

        Filesize

        4KB

      • memory/2240-13-0x00000000001F0000-0x00000000001F1000-memory.dmp

        Filesize

        4KB

      • memory/2240-8-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

        Filesize

        4KB

      • memory/2240-11-0x00000000029B0000-0x00000000029B3000-memory.dmp

        Filesize

        12KB

      • memory/2240-9-0x00000000029C0000-0x00000000029C1000-memory.dmp

        Filesize

        4KB

      • memory/2240-7-0x0000000000BD0000-0x0000000000BD1000-memory.dmp

        Filesize

        4KB

      • memory/2240-6-0x0000000000BC0000-0x0000000000BC1000-memory.dmp

        Filesize

        4KB

      • memory/2240-5-0x0000000000550000-0x0000000000551000-memory.dmp

        Filesize

        4KB

      • memory/2240-1-0x0000000001000000-0x00000000010C5000-memory.dmp

        Filesize

        788KB

      • memory/2240-2-0x0000000000A70000-0x0000000000AC0000-memory.dmp

        Filesize

        320KB

      • memory/2240-0-0x0000000001000000-0x00000000010C5000-memory.dmp

        Filesize

        788KB

      • memory/2240-170-0x0000000001000000-0x00000000010C5000-memory.dmp

        Filesize

        788KB