Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 05:08

General

  • Target

    56c8ddd07545efef53fb690b68211f4f.exe

  • Size

    82KB

  • MD5

    56c8ddd07545efef53fb690b68211f4f

  • SHA1

    deaad8c777f4f54459d15e8e2bd2a260258b1df3

  • SHA256

    c62e53f2bfcb2e17d5e80112e54f5c923120b258b5e0546073e96d096fae259b

  • SHA512

    a4dd882ccc0b747da51f0ac6d7acf8620b872e522e7c34a9fc650604ea88fab532c9beec0e0ee426b08dab1cf525d99a055b9136d6f4ae4f7fffd4f3add84693

  • SSDEEP

    1536:0h3oDFpr18upjOWOHQRTaTalf34DanAWtHDu:09AF118upKCBaTa94Dan1

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with taskkill 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56c8ddd07545efef53fb690b68211f4f.exe
    "C:\Users\Admin\AppData\Local\Temp\56c8ddd07545efef53fb690b68211f4f.exe"
    1⤵
    • Drops file in Drivers directory
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Windows\SysWOW64\notepad.exe
      notepad.exe
      2⤵
        PID:2892
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c sc config ekrn start= disabled
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2136
        • C:\Windows\SysWOW64\sc.exe
          sc config ekrn start= disabled
          3⤵
          • Launches sc.exe
          PID:2720
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill.exe /im ekrn.exe /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill.exe /im ekrn.exe /f
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2860
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill.exe /im egui.exe /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill.exe /im egui.exe /f
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3024
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe C:\Windows\tete259450598t.dll testall
        2⤵
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:304
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net stop wscsvc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Windows\SysWOW64\net.exe
          net stop wscsvc
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2444
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop wscsvc
            4⤵
              PID:1468
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net stop SharedAccess
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1660
          • C:\Windows\SysWOW64\net.exe
            net stop SharedAccess
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1316
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop SharedAccess
              4⤵
                PID:1624
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c sc config sharedaccess start= disabled
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1732
            • C:\Windows\SysWOW64\sc.exe
              sc config sharedaccess start= disabled
              3⤵
              • Launches sc.exe
              PID:2044
          • C:\Windows\extext259458132t.exe
            C:\Windows\extext259458132t.exe
            2⤵
            • Executes dropped EXE
            PID:1724
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c afc90a.bat
            2⤵
            • Deletes itself
            PID:1644

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\afc90a.bat

          Filesize

          2KB

          MD5

          0aae412c62899e795205dc32d86bfff5

          SHA1

          2c9487de933d2bd419aece04f43f5bca32835e62

          SHA256

          38924c6ffb726cf3a6dc22eede220d2e5ac404070a3f8f453f558127d79da189

          SHA512

          32e3ba22eda6e29509231eb5cee8c19d1c3e00eb485e68bff4fcb5e21ae1b407e52b88f08d371c743e21087f37f5db41cc7f953c40db226ba95853005753e224

        • C:\Windows\extext259458132t.exe

          Filesize

          12KB

          MD5

          4e009ff93e2df09682c750fbe7c2464f

          SHA1

          73acc80925f07e3346107730d785d8ae12adc6ef

          SHA256

          a885dfb99355992889b3432c9314a7d002b2d8ff6c8c79f665ee6e4057152d3d

          SHA512

          b0dcd0b09205ac25b2cdf459314768a000ac1780fc27d171f1c9a35b07d643fe39072199adad9cf0b1e70bda9f8d8ce1d50db967602c128760b72bebc8b98d09

        • C:\Windows\tete259450598t.dll

          Filesize

          40KB

          MD5

          956b20403cc1ae613ca8f8a6099bc4e2

          SHA1

          9cf339ea6d13c5e2b3e03a76f5261b7f46854c38

          SHA256

          dff795851e9a94b78befa2e9908eb680901d0af1191bf6db159a5d7be79a18a9

          SHA512

          6aeefefd3c3887463d06448cb52d8d2c10e52fa469d92f2115605f048f981b26c513360068bd8c3e438eedbaf061923f4625c8ee016fa46b7a384d5072643fcc

        • F:\AUTORUN.INF

          Filesize

          304B

          MD5

          99588afd717ec63824f97ee400c447c2

          SHA1

          be44b900e6da111806097b72e6cbbd75b20fc34a

          SHA256

          9d9699dd55fccc743cf30232755d98fc9a006ea81bcead9fbf0c176d9b2a6f3b

          SHA512

          18eaa762824d342d542ddfbbc8ab1d0699b2c61c0d9966be581a80f21a5a165a0e9963f2dee6937465ea39ebfff2455593c26ce37af22c79254b251905060ba4

        • F:\recycle.{645FF040-5081-101B-9F08-00AA002F954E}\rav32.exe

          Filesize

          82KB

          MD5

          56c8ddd07545efef53fb690b68211f4f

          SHA1

          deaad8c777f4f54459d15e8e2bd2a260258b1df3

          SHA256

          c62e53f2bfcb2e17d5e80112e54f5c923120b258b5e0546073e96d096fae259b

          SHA512

          a4dd882ccc0b747da51f0ac6d7acf8620b872e522e7c34a9fc650604ea88fab532c9beec0e0ee426b08dab1cf525d99a055b9136d6f4ae4f7fffd4f3add84693

        • memory/1436-0-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/1436-1-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/1436-38-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB