Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 07:25

General

  • Target

    5c6aa9597c5e55230fd300ff686336d5.exe

  • Size

    64KB

  • MD5

    5c6aa9597c5e55230fd300ff686336d5

  • SHA1

    2844419bf1e42db371927ea21dc3f5741062a134

  • SHA256

    79f396d4f64eee0c40b1ac582735492b1fb5cbb7c25afe80c43d8dce52fe8445

  • SHA512

    435dca4c31f3e3fb7b8256c6254f0be788bcc7f78278576d06a64166b29d45f8bf9a3113a77929a18e5b99304c10a9063f3d011ee0b09172884970a3389a4b98

  • SSDEEP

    1536:vjT8FsWAuPRoyn56J0wvV/5yJhrzd2d1PTChYACEcLsn:fDWA8iyU7yjdk8YJEcL2

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with taskkill 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c6aa9597c5e55230fd300ff686336d5.exe
    "C:\Users\Admin\AppData\Local\Temp\5c6aa9597c5e55230fd300ff686336d5.exe"
    1⤵
    • Drops file in Drivers directory
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Windows\SysWOW64\notepad.exe
      notepad.exe
      2⤵
        PID:3268
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c sc config ekrn start= disabled
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2248
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill.exe /im ekrn.exe /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4716
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill.exe /im ekrn.exe /f
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3180
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c taskkill.exe /im egui.exe /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill.exe /im egui.exe /f
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4380
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe C:\Windows\tete240643625t.dll testall
        2⤵
        • Drops file in Drivers directory
        • Sets file execution options in registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4252
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c net stop wscsvc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1448
        • C:\Windows\SysWOW64\net.exe
          net stop wscsvc
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2312
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop wscsvc
            4⤵
              PID:1644
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net stop SharedAccess
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4076
          • C:\Windows\SysWOW64\net.exe
            net stop SharedAccess
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3540
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop SharedAccess
              4⤵
                PID:2928
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c sc config sharedaccess start= disabled
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3176
            • C:\Windows\SysWOW64\sc.exe
              sc config sharedaccess start= disabled
              3⤵
              • Launches sc.exe
              PID:1772
          • C:\Windows\extext240647953t.exe
            C:\Windows\extext240647953t.exe
            2⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3068
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net stop wscsvc
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1236
              • C:\Windows\SysWOW64\net.exe
                net stop wscsvc
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2588
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop wscsvc
                  5⤵
                    PID:1864
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net stop SharedAccess
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4776
                • C:\Windows\SysWOW64\net.exe
                  net stop SharedAccess
                  4⤵
                    PID:4212
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop SharedAccess
                      5⤵
                        PID:220
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c sc config sharedaccess start= disabled
                    3⤵
                      PID:3452
                      • C:\Windows\SysWOW64\sc.exe
                        sc config sharedaccess start= disabled
                        4⤵
                        • Launches sc.exe
                        PID:5080
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
                      3⤵
                        PID:1432
                        • C:\Windows\SysWOW64\cacls.exe
                          cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
                          4⤵
                            PID:464
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c cacls C:\Windows\system32 /e /p everyone:f
                          3⤵
                            PID:1732
                            • C:\Windows\SysWOW64\cacls.exe
                              cacls C:\Windows\system32 /e /p everyone:f
                              4⤵
                                PID:2564
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c afc90a.bat
                            2⤵
                              PID:4928
                          • C:\Windows\SysWOW64\sc.exe
                            sc config ekrn start= disabled
                            1⤵
                            • Launches sc.exe
                            PID:224

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\afc90a.bat

                            Filesize

                            2KB

                            MD5

                            95369592b488037a69111c9b3c7a8424

                            SHA1

                            a8f191e013c5e81ae1c4da596d967ea93fe6a2c5

                            SHA256

                            09e662aea466d8ec2b18e414085e0ab86313b632f342ea290f8a07e17dd4c41d

                            SHA512

                            9a62af630aaa0de081e3c1ba68b669cf94cc48d244d726d9ee5335272b16c21ed7390b770823f3c549830f75e4dcc0c34b99aeca7643752bb90dccc838c63610

                          • C:\Windows\extext240647953t.exe

                            Filesize

                            10KB

                            MD5

                            973806259fdac708a1b92089a54675f8

                            SHA1

                            99fe99b1810dfae64d1b014927607a77d8383c16

                            SHA256

                            834450311e20086974ba80854180fdce4c2b8beb98c1c407a30dec3a8126c96c

                            SHA512

                            2da4491bd928b4c071acc311c2b05e63241a173eb1050cf0fe51799279d5bf9a268a8235aa822b8f053185d6cd7f8dba9317eb93322a8576586fd2542f1b9f80

                          • C:\Windows\tete240643625t.dll

                            Filesize

                            36KB

                            MD5

                            2c4156b222b22d48b9fad49d051d1a99

                            SHA1

                            c7ba5cd859de1c79573e4792d8830558f24f7315

                            SHA256

                            f9a62f276e8e5b3cf492ae60dbf363cd9e53a0be46a88a8c3dfe62ad0508edac

                            SHA512

                            a5748948cf104cf3460c5d08bd55125af2d1f2d6d6ca494d756c00c54a8871aee8e6864bd673aa76104c1e8ed273fa9c5f4969ae39017ae84be3f74b5d6e6c31

                          • F:\recycle.{645FF040-5081-101B-9F08-00AA002F954E}\rav32.exe

                            Filesize

                            64KB

                            MD5

                            5c6aa9597c5e55230fd300ff686336d5

                            SHA1

                            2844419bf1e42db371927ea21dc3f5741062a134

                            SHA256

                            79f396d4f64eee0c40b1ac582735492b1fb5cbb7c25afe80c43d8dce52fe8445

                            SHA512

                            435dca4c31f3e3fb7b8256c6254f0be788bcc7f78278576d06a64166b29d45f8bf9a3113a77929a18e5b99304c10a9063f3d011ee0b09172884970a3389a4b98

                          • memory/1396-0-0x0000000000400000-0x0000000000418000-memory.dmp

                            Filesize

                            96KB

                          • memory/1396-1-0x0000000000400000-0x0000000000418000-memory.dmp

                            Filesize

                            96KB

                          • memory/1396-23-0x0000000000400000-0x0000000000418000-memory.dmp

                            Filesize

                            96KB

                          • memory/1396-39-0x0000000000400000-0x0000000000418000-memory.dmp

                            Filesize

                            96KB