Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 08:23

General

  • Target

    11c0d69ad738509cff0fdb246a39ed34.exe

  • Size

    641KB

  • MD5

    11c0d69ad738509cff0fdb246a39ed34

  • SHA1

    b2ae3e69e3b8a7e5b0044ffb71acf48549d0b7d5

  • SHA256

    d71c4cf97c8ab7bc7224b978c949858e180cb8683d750d9ac212c5957feedeea

  • SHA512

    6e833e48fdb9793fb0a2bf58967700868a92e12f1d42b7ecd725976f01739a51d1500200e96561ab897f3483d3a5da6711a7c80099af006af358e19ca757a76c

  • SSDEEP

    12288:rAvRNj1tU3Gh/RlhHqz0+sGNmQ9BUfPPf//uY4XKw8fTQPT3RZTafc8vy4hj:rA5l3UWh1KA+D8YBUfPHuY4XKw8f8P7C

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11c0d69ad738509cff0fdb246a39ed34.exe
    "C:\Users\Admin\AppData\Local\Temp\11c0d69ad738509cff0fdb246a39ed34.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Users\Admin\AppData\Local\Temp\bedfhegfah.exe
      C:\Users\Admin\AppData\Local\Temp\bedfhegfah.exe 2\5\6\2\6\1\7\7\5\2\7 LUtDQjcxKywyMRktTk9ASkg9NiseKExATlVJUURCPzsqHio+R01TQj04MDIuLzIeKUJCPTguGS1LTE0+VDxNWkc9Oy0yMSs4GShOQ0tUQExdT1FFNmNybW41KS1tcW8nP0NMSShOTUosOklLLEJMQUkeKUJFQj5JQkI4Gi0+MDYmLB4oQi03KysfKD0uOyYvGylCLjwmKhstPTM4Jy8aLklLSkJOQU9ZTkxITzo+VzYeKkpQSUNOPE9dPlNHOzsaLklLSkJOQU9ZTDtMPjZDeGV0YGBpX2tiME9wZGM/b2BmYGM/cGplZ2leZ2wfKD5TQ1hTTUY7Gi4+UUBdPEs/RkdIRDYZKkZIUU9ZQExOUExAUDYuGylSQkBHRFRNTl1QTEo3HyhPSDsrHio+USs8GShNU0dSREdDWVY+RT5NRkNERz9BRE5LRzsZLURNXUxUR01ESz47b2xzXx8oS0BSTlBJQ0xBXk5MQFBYQjxTUTcxGShDRz1DUzcvGi5CTFpCUkw8R0c9Xj5HPlBSTk8/QjdlWmVuYxktP0lVSEtIOj9dQk44MTAoMCcqNDQnLzMuHilTQkZAOyoyLi81LzYtLDMeKEJKUUxGTjo9WlJCS0A3NSkwKCsrLy4oLDQxKjksMSVORg==
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2860
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81703539740.txt bios get serialnumber
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2404
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 368
    1⤵
    • Loads dropped DLL
    • Program crash
    PID:2628
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81703539740.txt bios get version
    1⤵
      PID:2516
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic /output:C:\Users\Admin\AppData\Local\Temp\81703539740.txt bios get version
      1⤵
        PID:2484
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703539740.txt bios get version
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2576
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703539740.txt bios get version
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2600

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \Users\Admin\AppData\Local\Temp\nst8D8.tmp\docqoul.dll

        Filesize

        92KB

        MD5

        8e9a99fb95a178ab584f77a604916493

        SHA1

        adb5c1ac8f74cc45562e3875367e70be19a360d4

        SHA256

        7662911c857dc45ff7b64eb8708a58001edf589d1d314df73a35d5c6180ae49d

        SHA512

        4ca1e811574db169d7ff4df15c0b88d0eddbcf36f41b2b5fbdbba6c71f51065d76051d9fab4ac0b997f83b237ffb5ba6548829cc20bbbddfbe4e89a4fd7b0e06