Analysis

  • max time kernel
    146s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 11:47

General

  • Target

    1bdff1e6881a83e4370f3618017833c8.exe

  • Size

    3.4MB

  • MD5

    1bdff1e6881a83e4370f3618017833c8

  • SHA1

    3b05ef7a415513ee514138d61ccc350cb77fab3a

  • SHA256

    23adb4f0b4fb5edc75ccb3bbd13df83f3e982443f1834517857e601a5fedff1e

  • SHA512

    392df7e76bea6fb2b2650fe225c0d8b7741b97d509eb1a61a8e3ac283addeb1bccfae041b419effc85888f8fb01f1627c607526ef1999177642ba53fa6984c95

  • SSDEEP

    49152:Ng6+iUofhEpg0IZymfPDw5927wIGwZ7zUmwWr3WWGRexzTAIhy3JaGe:Nz+Jpg0UymfbjVZfm6mWGRelThUJs

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 11 IoCs
  • Drops file in System32 directory 15 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bdff1e6881a83e4370f3618017833c8.exe
    "C:\Users\Admin\AppData\Local\Temp\1bdff1e6881a83e4370f3618017833c8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1516
    • C:\Users\Admin\AppData\Local\Temp\install_185274641.exe
      C:\Users\Admin\AppData\Local\Temp\install_185274641.exe /I
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4104
      • C:\Users\Admin\AppData\Local\Temp\install_185274641.exe
        C:\Users\Admin\AppData\Local\Temp\install_185274641.exe /I
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3220
        • C:\Program Files (x86)\Tor\tor.exe
          "C:\Program Files (x86)\Tor\tor.exe" --install --options -ControlPort 9051
          4⤵
          • Executes dropped EXE
          PID:2268
  • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe
    "C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe
      "C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2280
      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe
        "C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe" /R
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3440
        • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe
          "C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe" /R
          4⤵
          • Executes dropped EXE
          PID:2220
  • C:\Program Files (x86)\Tor\tor.exe
    "C:\Program Files (x86)\Tor\tor.exe" --nt-service "-ControlPort" "9051"
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:4536
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4536 -ip 4536
    1⤵
      PID:4672
    • C:\Program Files (x86)\Tor\tor.exe
      "C:\Program Files (x86)\Tor\tor.exe" --nt-service "-ControlPort" "9051"
      1⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      PID:4656
    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe
      "C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4592
      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe
        "C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe"
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        PID:3032

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Tor\tor.exe

      Filesize

      372KB

      MD5

      0304544b20ef7a965b7675f5fa34fe5c

      SHA1

      924204ff28259153ef9072ef275bc637d4a09ab4

      SHA256

      7377c0944095fa1223b0e09f5a7e09ad42a20ceeda8d0c0610b88e5dcc6eb631

      SHA512

      73b9c9ac8ddc50deae8bc29a4f815752a10c4f04f619ce7aba961dda4eab99872cd53f9aa2c53960bfd0b50bdcc848aa012cebae0a91aa793c0f44e3246944f3

    • C:\Program Files (x86)\Tor\tor.exe

      Filesize

      273KB

      MD5

      7759bcdadcd71f3275d44d0ca59e8e9d

      SHA1

      427272c546fe73252e021b596e805c9505f5fa2a

      SHA256

      1c078c6b36ae48198d015252e8c58f1bd2fa26bff5595c48286f46ef09af8085

      SHA512

      e936086d18707ba5ab098fa44b54407f9fcf68e377b1ddc8ca4865a11a95b8d373e64c3528bc0a2638598509b060d698ef17ecf1130594a84aa1d122ddd18b8f

    • C:\Program Files (x86)\Tor\tor.exe

      Filesize

      248KB

      MD5

      0426569a74241f24313febf8683fa88c

      SHA1

      22743807ad5b4d736b55ab5b4c2fd1955b554be7

      SHA256

      320c84c5153c50b7d674fd97b12e23cfe08d1161e4f13f90e17a8c9ddef3d3e6

      SHA512

      a9d9634d9d69784eac4668530b435509874a0eb468e561172487ef8e61649e82f43fa8ddc6aac68fcadc6c7f953cd13b59aa5cab840c2c3dca5be96a1b80c764

    • C:\Program Files (x86)\Tor\tor.exe

      Filesize

      299KB

      MD5

      99b7873f07548fd36cec11674bafabcd

      SHA1

      9c7e7e36bcb7f2c9b730c649ecbfe6e7c8b95472

      SHA256

      18909f038ced91790104ea01fc95e6c6d0b670df63754fa62c418c2eca15fda2

      SHA512

      08024cd9013234fcf6403191767c7153d072c925f5333c9072c9873a2a28daeb2767b223d81ec96317fc739df8a06eea1c849f6706ecc43de325c177fb033a83

    • C:\Users\Admin\AppData\Local\Temp\install_185274641.exe

      Filesize

      1.3MB

      MD5

      792140c8e606d543435353f579bea15c

      SHA1

      c26a1315984df8b70e49db692a0d648338d11e2d

      SHA256

      f660c7229f6c816d99bfdfa161f0c0d0a68bc12882f98bd06dcca59304688a4a

      SHA512

      a2f50d4ab59157e39805fe948a0e1bd68dda8559503fffddb815a78537305479082fba19d2eaa39b67c9a58ca6169e5e710557325045ba478e3d824a0484e558

    • C:\Users\Admin\AppData\Local\Temp\install_185274641.exe

      Filesize

      1.2MB

      MD5

      fd1c51ad0ca2ef6c12394c2d3edf5b27

      SHA1

      6a3da5a4fecac16881d4c57ac9088b7a59b4bf33

      SHA256

      845cdd4ac2ae629da1a671565039a0ac7333d25b6f93de999af1bdee40839f7b

      SHA512

      34555b2ebc3298a0525af6b96f01b8d132e91b515def5976debbcafa05280d4a8d9689e554222ac808dfe914327f96d9c893a7002874a6949cfd572e96e54e70

    • C:\Users\Admin\AppData\Local\Temp\install_185274641.exe

      Filesize

      287KB

      MD5

      d1ec7c9966ddd3c1e42dc74855d92023

      SHA1

      ac30bab93f171f20feb13549680e8f810c393597

      SHA256

      b339008a8ab99a8eb17fa13f4b99d19094514d671a5a2604301e748d0864e22b

      SHA512

      697e272bcf8d1a7671a7b8093343e603eebc1cfbac9faaca7ae616534253f9490dfc69d66985d2d012c7d20dd4ebb31558419b55105508a801c9abd44a35e68e

    • C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\tor\state

      Filesize

      222B

      MD5

      596cdbf00054e34ec9008c8b71c5b1ac

      SHA1

      1333af043f8cc27eacd77e37d7e739de4f39e9b3

      SHA256

      cd3bf7eb811b141268543ef323730dac31349ee1dcef2df87b8e4ecfc02d8f0f

      SHA512

      e9d5df72de5d8b0ec0125032d244559a0b5ab8168b96d25ced2c3fc0ab1c83d825c3b350df803b806a858124910ace985291d5a0879758ae63c0c0a413265fc8

    • C:\Windows\SysWOW64\config\SYSTEM~1\AppData\Local\WINDOW~1\QUERIE~1.CAC

      Filesize

      150B

      MD5

      6112a7eb79d9a007ed62703275c28f2c

      SHA1

      e46880f64c8c13ecb15b3c79603f11f97a5c6b25

      SHA256

      a2bda4cbb04af36a049df24c8d2265193019e5a2ce8d575fddb1103f2519da16

      SHA512

      4e5896b219c9a984e6cdbf82b194b2b1937b09ba5f7482759f8e42b4ed2a02e90f334f798ed0c1af4a646d24a346fc5d62e3a47d2e93d09c1c080a369a6317e1

    • C:\Windows\SysWOW64\config\SYSTEM~1\AppData\Local\WINDOW~1\cache.00

      Filesize

      65B

      MD5

      3af948f58f27dea4bf114da1149476c7

      SHA1

      4d024cb560590a2db5f5b0e520fb60ae2711383f

      SHA256

      27900e1f2ea88b5e57b2a4b96dd03384253ceaa7b462cf8e76f63fa292e313eb

      SHA512

      210cdbf5fc6de816d40273fdcd58ca00a74c5dc059f8eebc518104d0d4c075caab474356ea8deb03d71051452c86340952b25938ab784e773dd824d9c3481c8c

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\049e7fb749be2cdf169e28bb0a27254f\181084e525a65ef540c63d60ce07f836.ct

      Filesize

      337B

      MD5

      0ac90ad2c8e1a80b91e6ad63ba231a06

      SHA1

      be5c01446d41fa669ae2bfa30b15b48f90bf1261

      SHA256

      c6b5f76af49c0d25077c52c963a7d6e99cb6f1eb2f9c812410cc732d798961b8

      SHA512

      9ed8dc524dcfdbbd457765408896e883c3f685f84236be69fdb29a2d2a7183ec61986ced6258377ccfcc3dca0026d2cc134852ee820e0f6bf27de1bc799e2858

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\049e7fb749be2cdf169e28bb0a27254f\181084e525a65ef540c63d60ce07f836.ph

      Filesize

      81B

      MD5

      3b626bd73e386d9ec3bc1625ffb3af53

      SHA1

      25674c6845e67309a9c89279c2cd8aef332ef95c

      SHA256

      112ebd2a80dd7df9344dcb8fe6993d1b85e8c64ce7cc832ae45a378f242a29c5

      SHA512

      1c9c3c1c9f7eb48684bced8cf91fec7086af8628810a26e292178d14893da283ece62bd624c6f6f8053b177dbea128b8e51710aa26b38d5bd2a88ff927b223e1

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe

      Filesize

      242KB

      MD5

      2163e46d09f5ae4096b487b2a94d4ace

      SHA1

      e90f18bfa10efcbadef56c85028c1ab7c1d5f17c

      SHA256

      8c068d1acc12c839d17e5b58bbfbc081ff3016a622f970f0b6eade23c936ba3a

      SHA512

      b5a186714c0e367dbb35243015cb627e08f17615ec5cfc7d3708cb736614dfc5230663d0d59389140fced1404a2bfe6f6c6b8717b5397c53515e5907b7d46b72

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe

      Filesize

      317KB

      MD5

      bfcbf3da487a27ee3580394bf7da8af3

      SHA1

      02aaa194551d10e3735fd8843303eda982ff5503

      SHA256

      6e22eb635e8ac9ee4beb7d88571fe2e16062c75368c803a778516838cebc94a9

      SHA512

      4b12648cd36b6f580d10b8c251d556c089480ac2a4dc25320ef85b64e66b8cb1f69b71c3d2a1df8288b1c60676a3decdec3e4a1c6b980b1335da9a6cab6aa33c

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe

      Filesize

      158KB

      MD5

      ff17e137f3fe1cf4f7929d6a72fe7997

      SHA1

      fea4ce7879a0c9664264acd642295e17648fc39a

      SHA256

      0083fea5daad7804b61a5f06ee8636ba4f75f94bf4386b00964ddcc1ad6dfbd2

      SHA512

      ae1aca9603df8e6a61297bc9c7fbffebee298a3d72e5ffadce36f78f55cb7f637a875f0dc45faeaa3318f9bdd72a271ee657bd883263f843a494745d93a34ad8

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe

      Filesize

      2.4MB

      MD5

      6dafc802afd08579ac47725e37e4bec1

      SHA1

      435e8dfe740316ef39f1bcdfafca90a2d3af9f19

      SHA256

      678e5143a02b3310a7b9985dfb933260e7687852e9a46b2d05fd57a65688d3ad

      SHA512

      b483c60b4fa9d2939ecddd4bd63f33a8bc37572e4c2fb31bef1fe8ec5dd1641925a9a0ee8eede69982e4d134e856c893bf0340de560d5e55369e082dc823a275

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe

      Filesize

      1.1MB

      MD5

      0bd3a4dd80d8c8ccb5dc80f4474741f0

      SHA1

      f1b6182331c9113c30377d97f6491d78ce7f2653

      SHA256

      02a83df4cc2287b262db56c954929a4476d61f8e3300e287b1432ec9a82c12f9

      SHA512

      c365cd14ee39e8e61bcf1d71d858e11d96fccad6673c8112ed39a1c3ee4a21f7b56d5350e8b545291310a11e4924c0a568cfc325f5b2b43316de323306432bfd

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe

      Filesize

      1.7MB

      MD5

      3a1fc7db010a418f8d053782cc3a0f21

      SHA1

      c39d842b77114368497e4a883947fad392c0a351

      SHA256

      530fd3bbfa1614f9c807eb5daa6ed99f9595874a8871d6d31a0634566d8f2b4a

      SHA512

      41613b7120fedcd7862eb2b4a945d56e26afe611d599f9723676617b4cb815f2e6da950ab93c354426f2bc2435c95b958a7e11fad9dda47a71b255152f7b063d

    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Windows Internet Name Service\wins.exe

      Filesize

      160KB

      MD5

      ba0dd9b14f89dca7f59f26d9f2963c60

      SHA1

      ae3ca386161c3e89c428fb6623647b52a370fbca

      SHA256

      1b17b210f548bc01f34578cbdf333e047d401078fa943c1b794eea9fb4c0afec

      SHA512

      e5d089aed9a7dbc8a06e95bd90425a6ea206b22c76e8fb5ce930e3fe3fd75a6c50428dad528a48fdc961e394cec8cddd9821092af7a4c3c564114f2cc022d287

    • memory/2220-52-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/2220-62-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/2268-26-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB

    • memory/2280-24-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/2280-25-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/2280-42-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/2280-29-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/2280-53-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3032-92-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3032-91-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3032-89-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3032-88-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3032-93-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3032-73-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3032-67-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3032-68-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3032-86-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3032-84-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3032-80-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3220-8-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3220-17-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3220-4-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/3220-7-0x0000000000400000-0x0000000000CF4000-memory.dmp

      Filesize

      9.0MB

    • memory/4536-28-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB

    • memory/4536-38-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB

    • memory/4656-85-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB

    • memory/4656-69-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB

    • memory/4656-43-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB

    • memory/4656-59-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB

    • memory/4656-57-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB

    • memory/4656-55-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB

    • memory/4656-94-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB

    • memory/4656-96-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB