Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 13:16

General

  • Target

    210d26e6d79d83ca1816af1b522fdd79.exe

  • Size

    572KB

  • MD5

    210d26e6d79d83ca1816af1b522fdd79

  • SHA1

    0a5c6f4068269fcb4f364225875494cbe9f4d03c

  • SHA256

    39e6a9aac5ca1eaa5b1994326975ba816361d0fcc1010c2cc341d27cd64ab575

  • SHA512

    a493e42bac73af39c053584525a36853724a3ecf14a1b020ac3cc3675deec77f3330c02bc96864945ba0cb1760d4b484e96370811fadba0f51d3728500225c8d

  • SSDEEP

    12288:BgsqqXM/J3WHOtzx0thPuclKDIrr85yEQK0r:BgLEkM9uclKcroyEQK0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\210d26e6d79d83ca1816af1b522fdd79.exe
    "C:\Users\Admin\AppData\Local\Temp\210d26e6d79d83ca1816af1b522fdd79.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Users\Admin\AppData\Local\Temp\dcgcabfibbcc.exe
      C:\Users\Admin\AppData\Local\Temp\dcgcabfibbcc.exe 1-8-7-3-4-6-5-5-0-8-9 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703757667.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2892
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703757667.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2584
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703757667.txt bios get version
        3⤵
          PID:2656
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703757667.txt bios get version
          3⤵
            PID:2268
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81703757667.txt bios get version
            3⤵
              PID:2532
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 372
              3⤵
              • Loads dropped DLL
              • Program crash
              PID:2984

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\81703757667.txt

          Filesize

          66B

          MD5

          9025468f85256136f923096b01375964

          SHA1

          7fcd174999661594fa5f88890ffb195e9858cc52

          SHA256

          d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

          SHA512

          92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

        • C:\Users\Admin\AppData\Local\Temp\81703757667.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Local\Temp\81703757667.txt

          Filesize

          58B

          MD5

          dd876faf0fd44a5fab3e82368e2e8b15

          SHA1

          01b04083fa278dda3a81705ca5abcfee487a3c90

          SHA256

          5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

          SHA512

          e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

        • C:\Users\Admin\AppData\Local\Temp\nsi3B2D.tmp\lwwdq.dll

          Filesize

          106KB

          MD5

          72a71eac9dc6dcc3eab0f8742d217419

          SHA1

          5d11d9ea93c7434a1401bac7de1794689be6231a

          SHA256

          33bf83b8524663214099e0538988977f6426dd5d8526060ccd8d9011b8c2ef4c

          SHA512

          8f9176b3ae667616eae3a855245144023febee9b1220d0cd2e5d2e1dd880c5253ade785cd009c87fd96fd1655d1e35ac6e6a588fecc3d0a2026fdea9c4d3236e

        • \Users\Admin\AppData\Local\Temp\dcgcabfibbcc.exe

          Filesize

          830KB

          MD5

          5600644e7a1e0881fbfd26d88fd00b2f

          SHA1

          02ed74c7de2f39676fe90ad566d1cb4363a79935

          SHA256

          2d3bfe3103b4354f7fc5abf6debb226d9db14612ae8e46b0e33d6c500f85d877

          SHA512

          08bfd277fbb8014bf3e1022383433f9edd32253fc49b241c2422dcbba2e59dca0b0ebe24d7e56929a09b44d7e0e1eb361c69cd8a6485e8587c2029d6975dcb68

        • \Users\Admin\AppData\Local\Temp\dcgcabfibbcc.exe

          Filesize

          136KB

          MD5

          02bb0cbe1ce0f1e3871e9eb32ed4ec27

          SHA1

          1afcde4540d0c40698c9d18e4f0ef715978f55bb

          SHA256

          419764ee6ee5262f79a9ee6817f99aa0794304801d21a0095db6b3933b573580

          SHA512

          40d0567a086152711a7a3d57832b199a08236b5fbf2d9c8266acfe72f42830ed8ea4afc63ee71b9c055937cb04620ceb3e15a6fa216aa38d66d55336385ea9b6

        • \Users\Admin\AppData\Local\Temp\dcgcabfibbcc.exe

          Filesize

          214KB

          MD5

          f310a10d9fbb6542c0ef3da9010c0c04

          SHA1

          4082c39a0916b310bf54e4b6814a436cbf20fea4

          SHA256

          12ac1edc1b6154858e53f3195189b6cd90d30336dc77b1268ad3d9b9cf403612

          SHA512

          b581bac005bab799efc1dca5e46539d8ac0115b1f1fe1118ba05c20c60e310479c88b2b21a0f16c0f6c271f145eb90d5297c8872fe9c070492cf8d19d311bd9a

        • \Users\Admin\AppData\Local\Temp\dcgcabfibbcc.exe

          Filesize

          87KB

          MD5

          cbe8fa2462f732ceecb7118f3ac83c80

          SHA1

          4d80075fe8f0993775a49673f5876ebc79273db4

          SHA256

          9f8f4643a39968113d059b0ee895e354093cfe0c880a59a6e6bb628627b5c5d8

          SHA512

          52ef535e0630a2e280cc7315fb50f73c38738e0a7f67a41ed7a98d95bdf6831ee6ea197af6cede449187624542f07b6898e8b67c83edc4a5fc292b0c378c64ca

        • \Users\Admin\AppData\Local\Temp\dcgcabfibbcc.exe

          Filesize

          157KB

          MD5

          a9915e78fc7d55790d6f3572de2fff9a

          SHA1

          accf54018c4a60a4f79d406c94ce9c0af91fb8a4

          SHA256

          263b49741625c1fe6acc34b1ff3aa8031c9bbc1058e1063b6427e8b37e85c331

          SHA512

          fb6b8e6e318b3cf553dd0fcbdb51aa488be7591a8c372e2b3a1a6c25dba7fd9638a1a237c84d422ec12df42dc4bda83556d1e315ec2537405239bf84feb7823d

        • \Users\Admin\AppData\Local\Temp\dcgcabfibbcc.exe

          Filesize

          98KB

          MD5

          95742fd8223b4d49483c7f8de5a28d59

          SHA1

          84afe025681a8d9a7e3587e884ceda5dcb2be3c3

          SHA256

          d56c6f0d9d6ce0e8ef1187faac2dc3d37823fe8e70f5150c20f0cc929ecc4197

          SHA512

          865a78f24273426fbc55dd512e1299cd53a75b5fd076d7e8844c92aa0fd52f3313bde56a4da58b7a92adc758493a25a85310904be61864c9cdba9fc3449e38b6

        • \Users\Admin\AppData\Local\Temp\dcgcabfibbcc.exe

          Filesize

          136KB

          MD5

          ecda85046f45ccf766d9c8821bd91916

          SHA1

          952b88a4c525c21008689f8ca0dffcbfda354d64

          SHA256

          67da78410a3dec9584d692c6a1ce977e3e0345e36c467e54999fff2ff38c4067

          SHA512

          aa4784d78181227e531265e7032c77b0785a629e2998d5cd01804b6411136a5133f0689af8c1f2de533cdd95370c017b2288ddbf199e2943c3221d5b66fcbd7f

        • \Users\Admin\AppData\Local\Temp\dcgcabfibbcc.exe

          Filesize

          34KB

          MD5

          b737f30ecf72b60d854bdc4b5bd70d77

          SHA1

          8586ac7294c69592ddf5c3f4146adca30014ebd2

          SHA256

          87c5c0f1284dff3172c5b0b44db30a7e9d6ede48ea49f0cd6109b6013c9c0f66

          SHA512

          0e8b283401bbaa4173ae49368ff9b2f7d9b5b1437369c66527e74d70fed960c0372eafe6288f5b9c556b21e97cfb0de91c93217edb59c30f89dd555b73a4ba68

        • \Users\Admin\AppData\Local\Temp\nsi3B2D.tmp\nsisunz.dll

          Filesize

          40KB

          MD5

          5f13dbc378792f23e598079fc1e4422b

          SHA1

          5813c05802f15930aa860b8363af2b58426c8adf

          SHA256

          6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

          SHA512

          9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5