Analysis

  • max time kernel
    129s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 19:41

General

  • Target

    38c50dc64b1844dce80b81a595037461.exe

  • Size

    358KB

  • MD5

    38c50dc64b1844dce80b81a595037461

  • SHA1

    ebc97b517beb94afa65f56cda4c9808f80a3ae78

  • SHA256

    cb608850f1316afe1c7ff956f4e223a33a9ebf70769a8f84d7bfa9d12078f26c

  • SHA512

    4d863836390e07690d0fcd81ff8967597fb9a4c1bb08a141b858717ca9a236245f71b589325e6df9ed22b1d322ff254ed7578248567bbcf5ef856c3a013dd85a

  • SSDEEP

    3072:WyHKgphXKyKi/29Bywix+DNWgPYB1tSG8EK01p3c5kKNp:WyHNKyj/29Y58NW71tShE

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38c50dc64b1844dce80b81a595037461.exe
    "C:\Users\Admin\AppData\Local\Temp\38c50dc64b1844dce80b81a595037461.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\SysWOW64\net.exe
      net.exe stop "Security Center"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
          PID:2020
      • C:\Users\Admin\AppData\Local\Temp\geurge.exe
        C:\Users\Admin\AppData\Local\Temp\geurge.exe
        2⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2724
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\tujserrew.bat""
        2⤵
        • Deletes itself
        PID:2564
      • C:\Windows\SysWOW64\sc.exe
        sc config SharedAccess start= DISABLED
        2⤵
        • Launches sc.exe
        PID:2780
      • C:\Windows\SysWOW64\net.exe
        net.exe stop "Windows Firewall/Internet Connection Sharing (ICS)
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2628
      • C:\Windows\SysWOW64\sc.exe
        sc config wscsvc start= DISABLED
        2⤵
        • Launches sc.exe
        PID:2652
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)
      1⤵
        PID:2496

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\geurge.exe

        Filesize

        358KB

        MD5

        38c50dc64b1844dce80b81a595037461

        SHA1

        ebc97b517beb94afa65f56cda4c9808f80a3ae78

        SHA256

        cb608850f1316afe1c7ff956f4e223a33a9ebf70769a8f84d7bfa9d12078f26c

        SHA512

        4d863836390e07690d0fcd81ff8967597fb9a4c1bb08a141b858717ca9a236245f71b589325e6df9ed22b1d322ff254ed7578248567bbcf5ef856c3a013dd85a

      • C:\tujserrew.bat

        Filesize

        190B

        MD5

        75e9d6e6294f04e3a4ec71ae8251e15e

        SHA1

        2a04ff753217209af3570ca0751f45f793dd7887

        SHA256

        a7b2d452ee2b1a3050d03003f8b664fe88dd4cdd5dcc1fd18b1bb7fecbfcbc92

        SHA512

        f2cb72ed423293c9336abc88b339707301afbc1b21eec6be1a8fad92b1c113e0afaa75f110f704367d6ee1309637d2067611f29d48c8c340632a17a4380d0fbf

      • memory/2028-0-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB

      • memory/2028-4-0x00000000037E0000-0x0000000004842000-memory.dmp

        Filesize

        16.4MB

      • memory/2028-13-0x0000000005D20000-0x0000000005D7B000-memory.dmp

        Filesize

        364KB

      • memory/2028-27-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB

      • memory/2724-14-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB

      • memory/2724-18-0x0000000003660000-0x00000000046C2000-memory.dmp

        Filesize

        16.4MB

      • memory/2724-29-0x0000000000400000-0x000000000045B000-memory.dmp

        Filesize

        364KB