Analysis

  • max time kernel
    227s
  • max time network
    288s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 09:17

General

  • Target

    6306f11b58b3101f8733917a7e55f624.exe

  • Size

    186KB

  • MD5

    6306f11b58b3101f8733917a7e55f624

  • SHA1

    710abd7c511f4b1ab964c2e1f2f11c49cf280323

  • SHA256

    54a02c62da5909f1cb2c52a87925c58e559c3d789a3997417e705877cc9ba215

  • SHA512

    e3a5a218f4efe3d2ed385cf3cf7a5e51fcb557e1ce3353cb48de177e7e093683204927adf1cbb770816a2422e83462d2bf7a563f2a8b531fb7e8d97f5d746426

  • SSDEEP

    3072:jFjAY9/TB7tqg/4mwEG/erxGl1IlMAta77kFV3PLkTfxla:xcuVP2E8HA8kP/LCfa

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 18 IoCs
  • Modifies security service 2 TTPs 24 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Unexpected DNS network traffic destination 18 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
    • Modifies firewall policy service
    • Modifies security service
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:464
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\6306f11b58b3101f8733917a7e55f624.exe
      "C:\Users\Admin\AppData\Local\Temp\6306f11b58b3101f8733917a7e55f624.exe"
      2⤵
      • Registers COM server for autorun
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Deletes itself
        PID:836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-18\$6367fb4bb5c9d074f341f311a16214c0\@

    Filesize

    2KB

    MD5

    8abd5ac79e8b924f73e4b07ca7919108

    SHA1

    42c2acc95ae72335e6af05682e4de76a38a94978

    SHA256

    34fe3d545e488f1c88cfd445c2a8cb76f21089dd2c947dcead4157483ac403fb

    SHA512

    1ba19dfb655eb17525a764f992ed6620febce56ca1fa2bf4c8accfa546a7d6eb1afb80f6612d2e27ae1f6c4db514dc88f0f0482ddb590b3197b25765a47fb0fb

  • C:\$Recycle.Bin\S-1-5-21-3308111660-3636268597-2291490419-1000\$6367fb4bb5c9d074f341f311a16214c0\n

    Filesize

    25KB

    MD5

    9e0cd37b6d0809cf7d5fa5b521538d0d

    SHA1

    411ffdbe6c151dbd417bc59fa9dfec22b0adc9f2

    SHA256

    55d9748f0556576a8d522cf4b8dcfc9717436adcc487d49b3320770432960db2

    SHA512

    b511ee744dbe6cf0f54cb840d3786e89161115d0038425dde86d57752f76cae7a05f020120b43dc1444bd914c8c1690049e456635cc794fbf90e26794587dfc5

  • memory/464-14-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/464-20-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/1196-6-0x0000000002190000-0x0000000002191000-memory.dmp

    Filesize

    4KB

  • memory/1196-18-0x0000000000540000-0x0000000000640000-memory.dmp

    Filesize

    1024KB

  • memory/2844-13-0x0000000000540000-0x0000000000640000-memory.dmp

    Filesize

    1024KB

  • memory/2844-1-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2844-10-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2844-17-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2844-7-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/2844-2-0x0000000000540000-0x0000000000640000-memory.dmp

    Filesize

    1024KB

  • memory/2844-28-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB