Analysis

  • max time kernel
    143s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 13:38

General

  • Target

    72dcee5b3be1400e8b1573bd6d1e0add.exe

  • Size

    1.2MB

  • MD5

    72dcee5b3be1400e8b1573bd6d1e0add

  • SHA1

    f5661b761a681d242480d2ebf8d54bfa95650253

  • SHA256

    8cdd2c3b7d96469112a4b739bb191ef6889c8f48d38c3a9f474026cb3ee0354a

  • SHA512

    5c18f1c1eb9e5255949682d4776a9b76bd88399b82687f20bd48382979895b2a1f76cf01c377ffc75ee669390fc1cd542e24d03e80687a0af5bbc790f1fc479e

  • SSDEEP

    24576:HGh1Z8iyOGbjo8+IlZ3N8fqBua5wx7K2KhTPhFerC1rLuSUPmKKv:mh1Zi+IbeqBr5wBViFFe2rLuSUPmHv

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 6 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 17 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72dcee5b3be1400e8b1573bd6d1e0add.exe
    "C:\Users\Admin\AppData\Local\Temp\72dcee5b3be1400e8b1573bd6d1e0add.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
      "C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: AddClipboardFormatListener
        PID:2988
    • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
      "C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cmd < Ricuperato.wp5
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2588
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c vQGBA
        3⤵
          PID:2680
    • C:\Windows\SysWOW64\findstr.exe
      findstr /V /R "^EnhDnNjlXrURXGTHBGcErTQGpvzbczMcOtOaPLgHqaCqUVAjimpGqkiKHHzezPPDdmeTSASQsNELsQLgVifVpyxCXrKia$" Cresciuto.wp5
      1⤵
        PID:2464
      • C:\Windows\SysWOW64\PING.EXE
        ping localhost -n 30
        1⤵
        • Runs ping.exe
        PID:2484
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mettermi.exe.com
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mettermi.exe.com H
        1⤵
        • Executes dropped EXE
        • Checks processor information in registry
        PID:2224
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wxarksjpawnu.vbs"
          2⤵
          • Blocklisted process makes network request
          • Modifies system certificate store
          PID:2276
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mettermi.exe.com
        Mettermi.exe.com H
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2720

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

              Filesize

              65KB

              MD5

              ac05d27423a85adc1622c714f2cb6184

              SHA1

              b0fe2b1abddb97837ea0195be70ab2ff14d43198

              SHA256

              c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

              SHA512

              6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

              Filesize

              1KB

              MD5

              a266bb7dcc38a562631361bbf61dd11b

              SHA1

              3b1efd3a66ea28b16697394703a72ca340a05bd5

              SHA256

              df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

              SHA512

              0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              562dca473151f96b5bab6098a187e403

              SHA1

              e66b3f55a1e262a6958a1f4dc760c1630d291300

              SHA256

              73dfd761ffdc4ac11947d9fb88ab48964e295b9551902836842a9fec4277d5b5

              SHA512

              cce3f364fc735d2ef7d103a2f517c69af0090dd554d1e9cfad5d74028664545657f9e7396b5f5801cc334dc76ae8fc10e7f1fb298eb0de810ae3198f7359d3f3

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

              Filesize

              242B

              MD5

              44cf0ff00758b3927f275812dc945b8a

              SHA1

              ee2cc8989633c2065923f3ceadf4f7ee2b83f5b8

              SHA256

              ba38b43d43abdaa5da21fd87457bf8649b536d671ba1964801711a69725abe95

              SHA512

              93304be6c65aa3e08d3094edf615274b19506c0930ec2f30710307cb867b9f3d03637b6a5991ea8f5e7f78100cae4d3c994bc3c324b08b6251e34a06f4e27f29

            • C:\Users\Admin\AppData\Local\Temp\8038.tmp

              Filesize

              313B

              MD5

              bee55e52500f967c3d9402e05dd57f65

              SHA1

              d8dc65ec97c6288e1fd10b8c4f8502e5a8a5bbf6

              SHA256

              b90eae4b05d321efc4519963349c1775dcea8e3b0ae53b50285545380b6539c0

              SHA512

              b8624a934fb74760f5b231ca97e89074b227ad9fe3bb08b01a81cf35760f06b346f395cf6683df5881dc429ae77af0d0a07cfeb9c9ec127e4e917191bf8c91da

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Cresciuto.wp5

              Filesize

              872KB

              MD5

              df5437e59260a6c202fe845c4d7f0029

              SHA1

              9ce58fb7fbe69b8e0bbd5a41f19c25c5c100cc0f

              SHA256

              73b58d79ab00c16c17f636a3e9397e62918c1f15c76238671e877218ab4ace23

              SHA512

              ab284ea9584f58cd6870e2fcdcce0c58cf181451b2b68d43ce6ef46f4b3261e0ded8e472b80092e3f29910ea86fbec31c6b45bf143875f3c61ba6c2bc434e3d3

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\H

              Filesize

              719KB

              MD5

              fa3f08a73a22c093788a300992788687

              SHA1

              03b274b873e0573c9df82e3bb6e45b38a43002e3

              SHA256

              40a5369aa52fbabad9262ad9d8173a1042c2dc2633c8edc3ee8df51d8fdc9335

              SHA512

              f95fc9f5a915eba24b52f3aa1be8fd7935cdb761e13c4fb535ec2fc1e8d260d0321d4cbb07f2a978a6b5f5a6e2b94eef75f4eaf74ca91d8fc839a9616af36dbd

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Mettermi.exe.com

              Filesize

              872KB

              MD5

              c56b5f0201a3b3de53e561fe76912bfd

              SHA1

              2a4062e10a5de813f5688221dbeb3f3ff33eb417

              SHA256

              237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

              SHA512

              195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Pei.wp5

              Filesize

              139KB

              MD5

              fa1fc0b0f0c7fdb07fb95e8049f23bcb

              SHA1

              b5b68cdbcd20eebd2381b6e7877381c25837d4d3

              SHA256

              2b85de4a05f952148b32559ccc8421d1a8d961881fd8cf02cfb3880f86774418

              SHA512

              ac930549a7a17c4189d8b036fd31c3f150443cff7c67c13ce7b02dce3bc19d89a238d5baa6a8c703e1146991e76751d0c81b3c30fb37b0c639735d03fff380e1

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ricuperato.wp5

              Filesize

              453B

              MD5

              b76512e39b5dd555e126412b7a5d19d3

              SHA1

              fd40c9251b63d06012694d6e5d172f9333081ddc

              SHA256

              61b4fb06ad59ca9e6e5c9e9e7028f14d2c503fb931db731b6892d5a7b1db78fb

              SHA512

              b23c3999e40b5eec5e6f5e317962c91f02f32d011e41e7498261d27888a1db175deb19086fb570b9c73e58dd86af5667f0ce13f4bead8bf54b50600267ab275a

            • C:\Users\Admin\AppData\Local\Temp\TarB698.tmp

              Filesize

              171KB

              MD5

              9c0c641c06238516f27941aa1166d427

              SHA1

              64cd549fb8cf014fcd9312aa7a5b023847b6c977

              SHA256

              4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

              SHA512

              936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

            • C:\Users\Admin\AppData\Local\Temp\wxarksjpawnu.vbs

              Filesize

              135B

              MD5

              6aa90f64cbaddcaebfac392c2d144755

              SHA1

              8c60d624ab763ecdd4e9a1966b5e47ffdaf4b27a

              SHA256

              3768acd3f94880cb3c51660e287b2e3266a41621ab111983907365068d622267

              SHA512

              3f877ae0a282bb721cef2f01c3179960e51cd14f1bf329153eda1c4a7f39ddbd5f8eb6d5a9eb2c2feceaa23ede1baee01efaa4d8e074a372cfa08ac6442377f2

            • \Users\Admin\AppData\Local\Temp\New Feature\4.exe

              Filesize

              281KB

              MD5

              591e85e8acca8cc0279b2ed1bf6a8748

              SHA1

              eb443def37bfffbf0f6d4bcac9f0b725f7cbe7d8

              SHA256

              581afcfed2363cb1a086e46b31821245893509ad0bea657359ce4f31a2edb356

              SHA512

              a0aa0aab6b3d160d7f75e9bb4e629bbd20b4e6b3d8dd3742cf02b721335e5d678183b6c3c1de14bd30c3aa7d75eb8a1558daf512b6ca019c8734ec07867fb41f

            • \Users\Admin\AppData\Local\Temp\New Feature\vpn.exe

              Filesize

              1.0MB

              MD5

              bfd950bbabd1e5b3f57a23cd7c618788

              SHA1

              d943e0b6d1a7366ff5747cab6a12b645b41cf64a

              SHA256

              cf886c14de35ffa30003c15934a5d69ade52ee8632544d84bcee6a89d45d92cd

              SHA512

              9e4365c2ef5218aa081643dec76f80dc5ee898554f77e6d5d319002f3b7664be600685962328459affdd530cfbb7c804960080b6b8f31c771215b7b8d3a3ebc2

            • \Users\Admin\AppData\Local\Temp\nso144D.tmp\UAC.dll

              Filesize

              14KB

              MD5

              adb29e6b186daa765dc750128649b63d

              SHA1

              160cbdc4cb0ac2c142d361df138c537aa7e708c9

              SHA256

              2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

              SHA512

              b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

            • memory/1748-56-0x0000000000540000-0x0000000000640000-memory.dmp

              Filesize

              1024KB

            • memory/1748-58-0x0000000000400000-0x00000000004CA000-memory.dmp

              Filesize

              808KB

            • memory/1748-57-0x00000000004D0000-0x00000000004F6000-memory.dmp

              Filesize

              152KB

            • memory/1748-71-0x0000000000400000-0x00000000004CA000-memory.dmp

              Filesize

              808KB

            • memory/2224-80-0x0000000004040000-0x0000000004067000-memory.dmp

              Filesize

              156KB

            • memory/2224-86-0x0000000004040000-0x0000000004067000-memory.dmp

              Filesize

              156KB

            • memory/2224-87-0x0000000004040000-0x0000000004067000-memory.dmp

              Filesize

              156KB

            • memory/2224-84-0x0000000004040000-0x0000000004067000-memory.dmp

              Filesize

              156KB

            • memory/2224-102-0x0000000004040000-0x0000000004067000-memory.dmp

              Filesize

              156KB

            • memory/2224-85-0x0000000004040000-0x0000000004067000-memory.dmp

              Filesize

              156KB

            • memory/2224-83-0x0000000004040000-0x0000000004067000-memory.dmp

              Filesize

              156KB

            • memory/2224-82-0x0000000004040000-0x0000000004067000-memory.dmp

              Filesize

              156KB

            • memory/2224-81-0x0000000004040000-0x0000000004067000-memory.dmp

              Filesize

              156KB

            • memory/2988-93-0x00000000005E0000-0x00000000006E0000-memory.dmp

              Filesize

              1024KB

            • memory/2988-77-0x00000000005E0000-0x00000000006E0000-memory.dmp

              Filesize

              1024KB

            • memory/2988-78-0x0000000000400000-0x00000000004CA000-memory.dmp

              Filesize

              808KB