Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 02:49

General

  • Target

    4ddfd1c0c9106b7ea7e2bc795f11aebd.exe

  • Size

    648KB

  • MD5

    4ddfd1c0c9106b7ea7e2bc795f11aebd

  • SHA1

    d037679416515d183c43ab376b693821bad86e9a

  • SHA256

    211fd2c8b55e5e54803a31a896ec02be8e9069cd409ab23394269163c574c445

  • SHA512

    f9d62642c3705486b5652ee9998100b6fd23aa84f0a41d0862b54510fc815cc6f487f475b12fff7256d9244064032bd2d2fa9e2c8af33311651315168b62f9ba

  • SSDEEP

    12288:uqQlkqusypbvVixhHQNMyTjApD4izvymAGtMa5cyUaBavn7UCnafc8vy4hl:uqjtsypbdVMyT0OiSUc4G386c

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ddfd1c0c9106b7ea7e2bc795f11aebd.exe
    "C:\Users\Admin\AppData\Local\Temp\4ddfd1c0c9106b7ea7e2bc795f11aebd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Users\Admin\AppData\Local\Temp\bedhefifca.exe
      C:\Users\Admin\AppData\Local\Temp\bedhefifca.exe 4*6*6*1*3*5*8*9*9*1*9 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3740
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704204918.txt bios get version
        3⤵
          PID:1360
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81704204918.txt bios get version
          3⤵
            PID:3356
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81704204918.txt bios get version
            3⤵
              PID:1796
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              wmic /output:C:\Users\Admin\AppData\Local\Temp\81704204918.txt bios get version
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2200
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 900
              3⤵
              • Program crash
              PID:3452
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81704204918.txt bios get serialnumber
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4572
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3740 -ip 3740
          1⤵
            PID:2736

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads