Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28-12-2023 21:33

General

  • Target

    f9a6de86c94cd0dee8677f209d63e99e.exe

  • Size

    1.0MB

  • MD5

    f9a6de86c94cd0dee8677f209d63e99e

  • SHA1

    0a49344ad81d12c9855cbc0a117b9ac119d8591a

  • SHA256

    e5ad7ad9f3a2608383fa7620dc30edf035156b117a688d5a2f96a1de10ee0a2b

  • SHA512

    ecec6b823b7e54933b068ef635fe2bd30eb28c2e9d7514fc710eb670af9a90c323358bccb3104e5a63cc794c1b6a48ceabe829d19257efcbca775315de2b02b5

  • SSDEEP

    24576:JmTe546UaAKlYJDJE3QDRtCKaVuUgwb6beDHHDDSvdiUm:JmA46VAsY3VDTG56yDHHDOlBm

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9a6de86c94cd0dee8677f209d63e99e.exe
    "C:\Users\Admin\AppData\Local\Temp\f9a6de86c94cd0dee8677f209d63e99e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Camtech\USB AutoRunner\install\USB AutoRunner.msi" AI_SETUPEXEPATH="C:\Users\Admin\AppData\Local\Temp\f9a6de86c94cd0dee8677f209d63e99e.exe" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\"
      2⤵
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2188
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Autousb.ini

    Filesize

    82B

    MD5

    e3ec887e6d9d44859cb1937152d848c3

    SHA1

    328307d3ebd8a1882b316b570b6877d1b5ad5973

    SHA256

    82bfa8aac13c2226f8e52359f42ac9667552c56fb5b242a2d23df8ad574cb1e5

    SHA512

    4a6bdfdd581b941029089b1437db75b409fff70f85aa4913438d5ee482e05741e6e212280d86cf130f687d1af98136918d20ce7ec63ac8eefe73c3a9210733a8

  • C:\Users\Admin\AppData\Roaming\Camtech\USB AutoRunner\install\USB AutoRunner.msi

    Filesize

    160KB

    MD5

    f8f6acc70c6897d7cb1036073c71ed57

    SHA1

    1d106abe47e3369de0392b78d12af4e5a5b5b838

    SHA256

    5be54708d093f2156b90cf9d4ef3ee74b159001efc9786eac743b59596bc098d

    SHA512

    81581745bdf589a6409b9d31046c1a34119d6762a3c3ab028d6504cddda44dbfb4242aaaeb2e8b5ccd15e55c4099697b0c5960550851638ad8ea708fcf93a9b5