Analysis

  • max time kernel
    44s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 19:58

General

  • Target

    39c14cfe4c684e46e172a4e889c75289.exe

  • Size

    150KB

  • MD5

    39c14cfe4c684e46e172a4e889c75289

  • SHA1

    57fe4fa2f27e419f1b6ec5a7a14b68e662c6e06f

  • SHA256

    4f83c2b531553ddc2cb04630a5cca53555031bbc1a8da70187eaac8825843e41

  • SHA512

    1bba05fbcdc0fca2508741a72bb826ab10df19751e1d0703a6fc63580f93f45117b841ad4ce76e029625245ce8b8ed1444902443f0fa299e47c0639ddbc0405e

  • SSDEEP

    3072:/VhUTNt0TSmLGkhjKXFvIGk6H0ydpZTr5iSTNL9cEVz3CiODcRwZ5:dkt0TSZkhWVvI+UupZTr5iSVrLmcE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39c14cfe4c684e46e172a4e889c75289.exe
    "C:\Users\Admin\AppData\Local\Temp\39c14cfe4c684e46e172a4e889c75289.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Users\Admin\AppData\Local\Temp\ind75AD.tmp
      C:\Users\Admin\AppData\Local\Temp\ind75AD.tmp
      2⤵
      • Executes dropped EXE
      PID:2676
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 256
        3⤵
        • Program crash
        PID:2216
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\INSE35~1.INI /quiet
      2⤵
        PID:1808
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext_favurl_cab.bat" "
        2⤵
          PID:460
          • C:\Windows\SysWOW64\expand.exe
            expand.exe "C:\Users\Admin\AppData\Local\Temp\favorites_url.cab" -F:*.* "C:\Users\Admin\Favorites"
            3⤵
              PID:5096
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\39C14C~1.EXE > nul
            2⤵
              PID:2924
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run_dws_file.bat" "
              2⤵
                PID:3044
                • C:\Users\Admin\AppData\Local\Temp\inl1395.tmp
                  C:\Users\Admin\AppData\Local\Temp\inl1395.tmp cdf1912.tmp
                  3⤵
                    PID:3088
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inl1395.tmp > nul
                      4⤵
                        PID:2956
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2676 -ip 2676
                  1⤵
                    PID:4512
                  • C:\Windows\system32\msiexec.exe
                    C:\Windows\system32\msiexec.exe /V
                    1⤵
                      PID:2028
                      • C:\Windows\syswow64\MsiExec.exe
                        C:\Windows\syswow64\MsiExec.exe -Embedding 9D3B5132439B5C417F59E7B67E0C8829
                        2⤵
                          PID:2960

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/2676-13-0x00000000001D0000-0x00000000001D2000-memory.dmp

                        Filesize

                        8KB

                      • memory/2676-12-0x0000000000400000-0x0000000000430000-memory.dmp

                        Filesize

                        192KB

                      • memory/2676-16-0x0000000000400000-0x0000000000430000-memory.dmp

                        Filesize

                        192KB

                      • memory/3088-79-0x0000000000400000-0x0000000000408000-memory.dmp

                        Filesize

                        32KB

                      • memory/4120-0-0x0000000000400000-0x000000000043E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4120-1-0x00000000001A0000-0x00000000001A3000-memory.dmp

                        Filesize

                        12KB

                      • memory/4120-3-0x0000000000400000-0x000000000043E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4120-15-0x00000000001A0000-0x00000000001A3000-memory.dmp

                        Filesize

                        12KB

                      • memory/4120-14-0x0000000000400000-0x000000000043E000-memory.dmp

                        Filesize

                        248KB

                      • memory/4120-33-0x0000000000400000-0x000000000043E000-memory.dmp

                        Filesize

                        248KB