Analysis

  • max time kernel
    66s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 16:44

General

  • Target

    7da141bda1457383f9a6ca7fa383826d.exe

  • Size

    311KB

  • MD5

    7da141bda1457383f9a6ca7fa383826d

  • SHA1

    825f2ddf7070716af0f6daa8cbd406e8c9cf59cf

  • SHA256

    7275f2475171b0eda0a16186373059751f3cca9898739c91656269dbf23f66bf

  • SHA512

    f3316b532cbb72d8a945a04fc31f8f517247b3c40365d9eeeeb2a1e5a2c09c1575c32555bc8cdbdb28e626b2ce3e064d18a93fe0842d3104d90ff02134e75695

  • SSDEEP

    6144:ezVbwB8sqjxtNuVflYuo/g4BuFJxlHwUfzVPF0cd6:ezVklsxtCflYuThFJwUfz1k

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7da141bda1457383f9a6ca7fa383826d.exe
    "C:\Users\Admin\AppData\Local\Temp\7da141bda1457383f9a6ca7fa383826d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2136 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7da141bda1457383f9a6ca7fa383826d.exe" & start C:\Users\Admin\AppData\Local\FBGZOU~1.EXE -f
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Users\Admin\AppData\Local\fbgzoukbzr.exe
        C:\Users\Admin\AppData\Local\FBGZOU~1.EXE -f
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:2584
  • C:\Windows\SysWOW64\taskkill.exe
    taskkill /f /pid 2136
    1⤵
    • Kills process with taskkill
    • Suspicious use of AdjustPrivilegeToken
    PID:3064
  • C:\Windows\SysWOW64\PING.EXE
    ping -n 3 127.1
    1⤵
    • Runs ping.exe
    PID:2588

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2136-2-0x0000000000330000-0x0000000000331000-memory.dmp

          Filesize

          4KB

        • memory/2136-6-0x0000000000340000-0x0000000000342000-memory.dmp

          Filesize

          8KB

        • memory/2136-7-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2136-4-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2136-3-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2136-1-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2584-17-0x0000000000290000-0x0000000000292000-memory.dmp

          Filesize

          8KB

        • memory/2584-16-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2584-14-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2584-13-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2584-12-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2584-18-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2584-19-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2584-20-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2584-21-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2584-22-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2584-23-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2584-24-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB

        • memory/2584-25-0x0000000001000000-0x00000000010A5000-memory.dmp

          Filesize

          660KB