Analysis

  • max time kernel
    14s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 07:17

General

  • Target

    5c00c66715858aaf9730d054817a5dff.exe

  • Size

    92KB

  • MD5

    5c00c66715858aaf9730d054817a5dff

  • SHA1

    0ab8c45f0d608ee89ebfd36e567d7c8a25c38563

  • SHA256

    06e236242363923ee82e1bbed07bc3230f55434719db6de1616b19a4a95cea85

  • SHA512

    00207f8d5aee9dfe10403d5971afab39c7a4c4fc2bada3ce77c7a28966742da051288d33f779c5fa6fec66b6640a70e4f38287d09d77f8bc505166b2aa1c7e7f

  • SSDEEP

    1536:T7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIfhxGA2y:Pq6+ouCpk2mpcWJ0r+QNTBfhv

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Manipulates Digital Signatures 1 TTPs 64 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Possible privilege escalation attempt 6 IoCs
  • Modifies file permissions 1 TTPs 6 IoCs
  • Modifies system executable filetype association 2 TTPs 45 IoCs
  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 5 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c00c66715858aaf9730d054817a5dff.exe
    "C:\Users\Admin\AppData\Local\Temp\5c00c66715858aaf9730d054817a5dff.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8768.tmp\8769.tmp\876A.bat C:\Users\Admin\AppData\Local\Temp\5c00c66715858aaf9730d054817a5dff.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Windows\system32\takeown.exe
        takeown /f C:\Windows\System32\hal.dll
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:2312
      • C:\Windows\system32\icacls.exe
        icacls C:\Windows\System32\hal.dll /grant Admin:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2832
      • C:\Windows\system32\takeown.exe
        takeown /f C:\bootmgr
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:2836
      • C:\Windows\system32\icacls.exe
        icacls C:\bootmgr /grant Admin:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2352
      • C:\Windows\system32\attrib.exe
        attrib -s -r -h C:\bootmgr
        3⤵
        • Views/modifies file attributes
        PID:2396
      • C:\Windows\system32\takeown.exe
        takeown /f C:\Windows\System32\winlogon.exe
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        • Suspicious use of AdjustPrivilegeToken
        PID:2328
      • C:\Windows\system32\icacls.exe
        icacls C:\Windows\System32\winlogon.exe /grant Admin:F
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2132
      • C:\Windows\system32\reg.exe
        reg delete HKEY_LOCAL_MACHINE /F
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Manipulates Digital Signatures
        • Modifies Installed Components in the registry
        • Modifies system executable filetype association
        • Registers COM server for autorun
        • Adds Run key to start application
        • Installs/modifies Browser Helper Object
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies Internet Explorer settings
        • Modifies registry class
        PID:2688
      • C:\Windows\system32\mountvol.exe
        mountvol c: /d
        3⤵
          PID:2616
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im svchost.exe
          3⤵
          • Kills process with taskkill
          PID:2296

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\8768.tmp\8769.tmp\876A.bat

            Filesize

            2KB

            MD5

            5ecedac1fe093f201fab5a07a9b0d5ca

            SHA1

            7cf99a6413a138d2f8195a3cd109b979e8b1ec2f

            SHA256

            b928e198cf0f91eeb4667cc49d24bde9d3cf64c3a41b3b634ec12cd9f26ec64c

            SHA512

            407fbc33d41d8ffafa51fbb75ee19b70d49dbda797f7aa8a67a696053d48f2916c52078566c0939040f6ba780bd815dfb86bbc978b7bc95eb8141341e44b17f2

          • C:\Users\Admin\AppData\Local\Temp\n1289c31209b745bv129423890812gv391273u9812hc3

            Filesize

            61B

            MD5

            58dc2fbd863695323e1421780e643d37

            SHA1

            842046e407a81bd07402a64ded3ab0e96c55fa8d

            SHA256

            93ca6db2027bf17d7b979440ba1e25bbef3e35895ea6d375025127d2819c13fe

            SHA512

            b34f53b44b77c14601902e41c20cd3976a8e5f27fa9cc195eb4ba3b71914cc4ed161b987674c01f7ad05640a591c849ace3f7688422c3ffc9c56d6a9d4e540f1