Analysis

  • max time kernel
    167s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 08:54

General

  • Target

    134cce8f1b8c29cf49d732e310abaebe.exe

  • Size

    169KB

  • MD5

    134cce8f1b8c29cf49d732e310abaebe

  • SHA1

    30a8e6a9f8634694baaf6fe255dab3f8b2970376

  • SHA256

    e259017d25afeb189c2835a1e2ae17cd874fb040c7ac15f62e5651f8754bbe41

  • SHA512

    99e58940834cfbec5997f428b1040a671c931e4abba0e0f5d542432587f2603447b9ace9258fd865212ceefe84bf4cf4e47417f1c84400ba98ee47eaa3d46933

  • SSDEEP

    3072:wzxBux14OFN/l1XyUDVI4F97URnh5xcnWPTAdxboY1fbH/YPo:wutoN5Twx8u/

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\134cce8f1b8c29cf49d732e310abaebe.exe
    "C:\Users\Admin\AppData\Local\Temp\134cce8f1b8c29cf49d732e310abaebe.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Windows\SysWOW64\net.exe
      net.exe stop "Security Center"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4284
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
          PID:4192
      • C:\Windows\SysWOW64\sc.exe
        sc config wscsvc start= DISABLED
        2⤵
        • Launches sc.exe
        PID:2452
      • C:\Windows\SysWOW64\net.exe
        net.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1884
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
          3⤵
            PID:3744
        • C:\Windows\SysWOW64\sc.exe
          sc config SharedAccess start= DISABLED
          2⤵
          • Launches sc.exe
          PID:3184
        • C:\Users\Admin\AppData\Roaming\i6g8xs.exe
          C:\Users\Admin\AppData\Roaming\i6g8xs.exe
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:388
          • C:\Users\Admin\AppData\Roaming\i6g8xs.exe
            C:\Users\Admin\AppData\Roaming\i6g8xs.exe -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
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3308
        • C:\Windows\SysWOW64\Rundll32.exe
          Rundll32.exe setupapi,InstallHinfSection DefaultInstall 128 C:\Users\Admin\AppData\Roaming\mdinstall.inf
          2⤵
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2000
          • C:\Windows\SysWOW64\runonce.exe
            "C:\Windows\system32\runonce.exe" -r
            3⤵
            • Checks processor information in registry
            • Suspicious use of WriteProcessMemory
            PID:3164
            • C:\Windows\SysWOW64\grpconv.exe
              "C:\Windows\System32\grpconv.exe" -o
              4⤵
                PID:4060
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\qiwpjt0oo.bat
            2⤵
              PID:2368

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\i6g8xs.exe

            Filesize

            169KB

            MD5

            134cce8f1b8c29cf49d732e310abaebe

            SHA1

            30a8e6a9f8634694baaf6fe255dab3f8b2970376

            SHA256

            e259017d25afeb189c2835a1e2ae17cd874fb040c7ac15f62e5651f8754bbe41

            SHA512

            99e58940834cfbec5997f428b1040a671c931e4abba0e0f5d542432587f2603447b9ace9258fd865212ceefe84bf4cf4e47417f1c84400ba98ee47eaa3d46933

          • C:\Users\Admin\AppData\Roaming\mdinstall.inf

            Filesize

            410B

            MD5

            3ccb3b743b0d79505a75476800c90737

            SHA1

            b5670f123572972883655ef91c69ecc2be987a63

            SHA256

            5d96bec9bc06fd8d7abc11efbb3cb263844ee0416910f63581dd7848b4e1d8dd

            SHA512

            09b1cdd4393f515f7569fbccc3f63051823ed7292b6e572bc9a34e4389b727b2914b22118e874864ccb32ef63016b2abd6d84510fd46fdee712fd84be59c114e

          • C:\Users\Admin\AppData\Roaming\qiwpjt0oo.bat

            Filesize

            190B

            MD5

            f7eaadf43a2093df59d39d2a0e15dd9a

            SHA1

            3925f9e353123d8f4008a160c459cde085973edd

            SHA256

            b84e847185cdd7901fff3de98fba72842d1ed9f24b00739ca62eac1acd0ecdbe

            SHA512

            42697872db54e2e55421204ac26db0675fd816b9af4feba92c861994eebf9d34beb736baaf285e10df0a55d9325417d02c5f9c74bbe937b3c0ab09bdbf24688d

          • memory/388-21-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/2468-0-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/2468-16-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/3308-22-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB

          • memory/3308-23-0x0000000000400000-0x0000000000432000-memory.dmp

            Filesize

            200KB