Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 08:07

General

  • Target

    10f50c7d2bf11557db5d60325e5bcc84.exe

  • Size

    577KB

  • MD5

    10f50c7d2bf11557db5d60325e5bcc84

  • SHA1

    00ae0fd3a325376f4b7f351a5f9df3df8b8762e4

  • SHA256

    05e1b452b099bf79943b925ca6d70e2491d13529ecbe28521de0f99554045202

  • SHA512

    7e2236939816ce1dec65fc4265dede4664975dc495aef0efeacc08d73c07886def65a0d8981af9511540e6b9fe1a46fbcc725dbdb25a7be4b525e0accf2f6a70

  • SSDEEP

    12288:XjnoIMqBJpEJ8+4upsUrOzxTJjefhV2b0qRXDjY/Xrt:XjnompEJdWzJ0foX4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10f50c7d2bf11557db5d60325e5bcc84.exe
    "C:\Users\Admin\AppData\Local\Temp\10f50c7d2bf11557db5d60325e5bcc84.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\Temp\cccabfdgbic.exe
      C:\Users\Admin\AppData\Local\Temp\cccabfdgbic.exe 6-7-5-9-9-7-3-3-8-2-8 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3428
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703691785.txt bios get version
        3⤵
          PID:436
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 864
          3⤵
          • Program crash
          PID:2056
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703691785.txt bios get version
          3⤵
            PID:2152
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81703691785.txt bios get version
            3⤵
              PID:1296
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              wmic /output:C:\Users\Admin\AppData\Local\Temp\81703691785.txt bios get version
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:5088
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703691785.txt bios get serialnumber
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:440
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3428 -ip 3428
          1⤵
            PID:2476

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\81703691785.txt

                  Filesize

                  66B

                  MD5

                  9025468f85256136f923096b01375964

                  SHA1

                  7fcd174999661594fa5f88890ffb195e9858cc52

                  SHA256

                  d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

                  SHA512

                  92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

                • C:\Users\Admin\AppData\Local\Temp\81703691785.txt

                  Filesize

                  2B

                  MD5

                  f3b25701fe362ec84616a93a45ce9998

                  SHA1

                  d62636d8caec13f04e28442a0a6fa1afeb024bbb

                  SHA256

                  b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                  SHA512

                  98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                • C:\Users\Admin\AppData\Local\Temp\81703691785.txt

                  Filesize

                  58B

                  MD5

                  dd876faf0fd44a5fab3e82368e2e8b15

                  SHA1

                  01b04083fa278dda3a81705ca5abcfee487a3c90

                  SHA256

                  5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

                  SHA512

                  e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

                • C:\Users\Admin\AppData\Local\Temp\cccabfdgbic.exe

                  Filesize

                  822KB

                  MD5

                  4e2125ef7db05b037e68cb220ea9e573

                  SHA1

                  8c11c04a82b16d48b959272eb247544c89717c96

                  SHA256

                  8fd8872b2e260cd35669124d5a6539a83d68af4af7dd6ec9b2c423a27a981983

                  SHA512

                  11a5b7fe8a6cd9f84c7fc2f04051abd780bd947a58aac1297b763dfebad18fdd8db3ccf2308e1349626129c0427e4f8ecb18059912e39232ac38af9925fc9020

                • C:\Users\Admin\AppData\Local\Temp\nsk473B.tmp\gxr.dll

                  Filesize

                  125KB

                  MD5

                  99a6fea9c25b372d3ec08180173cd947

                  SHA1

                  a5d8df9a5dc069452444e0bf972998f87dda9ccb

                  SHA256

                  9b2f0d2cfb9eacdabfbe4a78d3f1a539ea75f6a641c59799e012aa17ec8e82b2

                  SHA512

                  6faa64c2f16d8008d6be74d4c22b4b4fcb3eca3a07acd1b3f392098d9d4fbb0315e206859cc24451a42f88b214e90a5d196553a97a267ad452be005701e7257f

                • C:\Users\Admin\AppData\Local\Temp\nsk473B.tmp\nsisunz.dll

                  Filesize

                  40KB

                  MD5

                  5f13dbc378792f23e598079fc1e4422b

                  SHA1

                  5813c05802f15930aa860b8363af2b58426c8adf

                  SHA256

                  6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

                  SHA512

                  9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5