Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 13:16

General

  • Target

    210d26e6d79d83ca1816af1b522fdd79.exe

  • Size

    572KB

  • MD5

    210d26e6d79d83ca1816af1b522fdd79

  • SHA1

    0a5c6f4068269fcb4f364225875494cbe9f4d03c

  • SHA256

    39e6a9aac5ca1eaa5b1994326975ba816361d0fcc1010c2cc341d27cd64ab575

  • SHA512

    a493e42bac73af39c053584525a36853724a3ecf14a1b020ac3cc3675deec77f3330c02bc96864945ba0cb1760d4b484e96370811fadba0f51d3728500225c8d

  • SSDEEP

    12288:BgsqqXM/J3WHOtzx0thPuclKDIrr85yEQK0r:BgLEkM9uclKcroyEQK0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\210d26e6d79d83ca1816af1b522fdd79.exe
    "C:\Users\Admin\AppData\Local\Temp\210d26e6d79d83ca1816af1b522fdd79.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4992
    • C:\Users\Admin\AppData\Local\Temp\dcgcabfibbcc.exe
      C:\Users\Admin\AppData\Local\Temp\dcgcabfibbcc.exe 1-8-7-3-4-6-5-5-0-8-9 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:468
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703757663.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5004
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703757663.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3244
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703757663.txt bios get version
        3⤵
          PID:2904
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703757663.txt bios get version
          3⤵
            PID:3156
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81703757663.txt bios get version
            3⤵
              PID:1348
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 468 -s 948
              3⤵
              • Program crash
              PID:3200
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 468 -ip 468
          1⤵
            PID:944

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\81703757663.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81703757663.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\81703757663.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\dcgcabfibbcc.exe

            Filesize

            830KB

            MD5

            5600644e7a1e0881fbfd26d88fd00b2f

            SHA1

            02ed74c7de2f39676fe90ad566d1cb4363a79935

            SHA256

            2d3bfe3103b4354f7fc5abf6debb226d9db14612ae8e46b0e33d6c500f85d877

            SHA512

            08bfd277fbb8014bf3e1022383433f9edd32253fc49b241c2422dcbba2e59dca0b0ebe24d7e56929a09b44d7e0e1eb361c69cd8a6485e8587c2029d6975dcb68

          • C:\Users\Admin\AppData\Local\Temp\nsg48F1.tmp\lwwdq.dll

            Filesize

            106KB

            MD5

            72a71eac9dc6dcc3eab0f8742d217419

            SHA1

            5d11d9ea93c7434a1401bac7de1794689be6231a

            SHA256

            33bf83b8524663214099e0538988977f6426dd5d8526060ccd8d9011b8c2ef4c

            SHA512

            8f9176b3ae667616eae3a855245144023febee9b1220d0cd2e5d2e1dd880c5253ade785cd009c87fd96fd1655d1e35ac6e6a588fecc3d0a2026fdea9c4d3236e

          • C:\Users\Admin\AppData\Local\Temp\nsg48F1.tmp\nsisunz.dll

            Filesize

            40KB

            MD5

            5f13dbc378792f23e598079fc1e4422b

            SHA1

            5813c05802f15930aa860b8363af2b58426c8adf

            SHA256

            6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

            SHA512

            9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5