Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 05:10

General

  • Target

    56e00ae0c259a4f53a31cebc65836bae.exe

  • Size

    453KB

  • MD5

    56e00ae0c259a4f53a31cebc65836bae

  • SHA1

    c1028f238432baf7103ef1787e89ae6759a41a6a

  • SHA256

    134528e1bb2df40721b844a7ca899bd8e4d7f5b336271d04727d0e25353bec59

  • SHA512

    21dc4b682f31da16ec1644307beeda5a02cc9b9f62016418c0991f9dd07495a52baf9ec21f53548238c29e4ed89399d7414267b3b257f6b16683b1ea975f6704

  • SSDEEP

    12288:Zdtcsp3glHl1s15Ap/G/8g3D0Fw/tN8dkmLtpHHHrh7E:ZP3uHl6j8gz0FmcLbH1E

Score
9/10

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 39 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56e00ae0c259a4f53a31cebc65836bae.exe
    "C:\Users\Admin\AppData\Local\Temp\56e00ae0c259a4f53a31cebc65836bae.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -inputformat none -NoProfile -NoLogo -Command "Write-Host ($PSVersionTable.psversion)"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:804
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -inputformat none -NoProfile -NoLogo -Command "& {$avlist = @(); $os = Get-WmiObject Win32_OperatingSystem; if ($os.ProductType -eq 3) {Write-Host \"ServerOS^|0\";} elseif ($os.Version -like \"5.*\") {Get-WmiObject -Namespace root\SecurityCenter -Class AntiVirusProduct | ForEach-Object {Write-Host \"$($_.displayName)^|$(if ($_.onAccessScanningEnabled) {\"4096\"} else {\"0\"})\"};} else {Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiVirusProduct | ForEach-Object {$avlist += \"$($_.displayName)^|$($_.productState)\"};Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiSpywareProduct | ForEach-Object {$avlist += \"$($_.displayName)^|$($_.productState)\"};} Write-Host ($avlist -join \"^*\")}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsi1343.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    7579ade7ae1747a31960a228ce02e666

    SHA1

    8ec8571a296737e819dcf86353a43fcf8ec63351

    SHA256

    564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5

    SHA512

    a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b

  • memory/804-121-0x0000000073390000-0x000000007393B000-memory.dmp

    Filesize

    5.7MB

  • memory/804-116-0x0000000073390000-0x000000007393B000-memory.dmp

    Filesize

    5.7MB

  • memory/804-120-0x0000000002AC0000-0x0000000002B00000-memory.dmp

    Filesize

    256KB

  • memory/804-119-0x0000000002AC0000-0x0000000002B00000-memory.dmp

    Filesize

    256KB

  • memory/804-118-0x0000000002AC0000-0x0000000002B00000-memory.dmp

    Filesize

    256KB

  • memory/804-117-0x0000000073390000-0x000000007393B000-memory.dmp

    Filesize

    5.7MB

  • memory/2112-131-0x0000000072DE0000-0x000000007338B000-memory.dmp

    Filesize

    5.7MB

  • memory/2112-135-0x00000000027E0000-0x0000000002820000-memory.dmp

    Filesize

    256KB

  • memory/2112-134-0x00000000027E0000-0x0000000002820000-memory.dmp

    Filesize

    256KB

  • memory/2112-136-0x0000000072DE0000-0x000000007338B000-memory.dmp

    Filesize

    5.7MB

  • memory/2112-133-0x0000000072DE0000-0x000000007338B000-memory.dmp

    Filesize

    5.7MB

  • memory/2112-132-0x00000000027E0000-0x0000000002820000-memory.dmp

    Filesize

    256KB

  • memory/2192-14-0x00000000003C0000-0x00000000003E6000-memory.dmp

    Filesize

    152KB

  • memory/2192-83-0x0000000074530000-0x000000007453A000-memory.dmp

    Filesize

    40KB