Analysis

  • max time kernel
    60s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 23:05

General

  • Target

    0671c5cfbd0ea6344d096ad46cf0fe17.exe

  • Size

    25KB

  • MD5

    0671c5cfbd0ea6344d096ad46cf0fe17

  • SHA1

    33a80b4fb446ab1da6457b018b6b3a9a11a184a4

  • SHA256

    6c978b13d3a48cb2590123d5fdf3fbf5945ec0a73621caa32af809ffa22b2fa1

  • SHA512

    085ea0ec4df5e53e1e1fe5981d4b2c457762a4227c08c6ea18c2ec11b293ad132b59a34c380ec034de2ffb5a2858bfefcd8dc8c25f73a7afd0478c40602e8e21

  • SSDEEP

    768:MqbKI+C2pbyw15X/WllPlqZrpvUnYiu+:/KI+C2pWw1kzNq7MnYiu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Drops file in System32 directory 18 IoCs
  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0671c5cfbd0ea6344d096ad46cf0fe17.exe
    "C:\Users\Admin\AppData\Local\Temp\0671c5cfbd0ea6344d096ad46cf0fe17.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Windows\SysWOW64\wbem\csrss.exe
      C:\Windows\system32\wbem\csrss.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4752
      • C:\Windows\SysWOW64\wbem\csrss.exe
        C:\Windows\system32\wbem\csrss.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:5052
        • C:\Windows\SysWOW64\wbem\csrss.exe
          C:\Windows\system32\wbem\csrss.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2604
          • C:\Windows\SysWOW64\wbem\csrss.exe
            C:\Windows\system32\wbem\csrss.exe
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4888
            • C:\Windows\SysWOW64\wbem\csrss.exe
              C:\Windows\system32\wbem\csrss.exe
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2060
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                7⤵
                  PID:4752
                • C:\Windows\SysWOW64\wbem\csrss.exe
                  C:\Windows\system32\wbem\csrss.exe
                  7⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:3124
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                    8⤵
                      PID:1396
                    • C:\Windows\SysWOW64\wbem\csrss.exe
                      C:\Windows\system32\wbem\csrss.exe
                      8⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4872
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                        9⤵
                          PID:3180
                        • C:\Windows\SysWOW64\wbem\csrss.exe
                          C:\Windows\system32\wbem\csrss.exe
                          9⤵
                            PID:4304
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                              10⤵
                                PID:2256
                              • C:\Windows\SysWOW64\wbem\csrss.exe
                                C:\Windows\system32\wbem\csrss.exe
                                10⤵
                                  PID:1984
                                  • C:\Windows\SysWOW64\wbem\csrss.exe
                                    C:\Windows\system32\wbem\csrss.exe
                                    11⤵
                                      PID:4820
                                      • C:\Windows\SysWOW64\wbem\csrss.exe
                                        C:\Windows\system32\wbem\csrss.exe
                                        12⤵
                                          PID:4808
                                          • C:\Windows\SysWOW64\wbem\csrss.exe
                                            C:\Windows\system32\wbem\csrss.exe
                                            13⤵
                                              PID:1948
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                              13⤵
                                                PID:4984
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                              12⤵
                                                PID:1820
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                              11⤵
                                                PID:1824
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                      6⤵
                                        PID:208
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                      5⤵
                                        PID:1280
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                      4⤵
                                        PID:1684
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                      3⤵
                                        PID:4440
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\temp.bat
                                      2⤵
                                        PID:4840
                                    • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                                      "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
                                      1⤵
                                        PID:1600
                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                        1⤵
                                        • Modifies Internet Explorer settings
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:1020
                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1020 CREDAT:17410 /prefetch:2
                                          2⤵
                                          • Modifies Internet Explorer settings
                                          • Suspicious use of SetWindowsHookEx
                                          PID:4956
                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                        1⤵
                                        • Modifies Internet Explorer settings
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:1288
                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:17410 /prefetch:2
                                          2⤵
                                          • Modifies Internet Explorer settings
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1688
                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:17418 /prefetch:2
                                          2⤵
                                            PID:2508
                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                          1⤵
                                            PID:3404
                                            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3404 CREDAT:17410 /prefetch:2
                                              2⤵
                                                PID:1816
                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                              "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                              1⤵
                                                PID:2012
                                                • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                  "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2012 CREDAT:17410 /prefetch:2
                                                  2⤵
                                                    PID:2632
                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                  "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                  1⤵
                                                    PID:376
                                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:376 CREDAT:17410 /prefetch:2
                                                      2⤵
                                                        PID:3040
                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                      1⤵
                                                        PID:1608
                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:17410 /prefetch:2
                                                          2⤵
                                                            PID:2284
                                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                                          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                          1⤵
                                                            PID:2500
                                                            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:17410 /prefetch:2
                                                              2⤵
                                                                PID:2424

                                                            Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BJCNBC62\NewErrorPageTemplate[1]

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    dfeabde84792228093a5a270352395b6

                                                                    SHA1

                                                                    e41258c9576721025926326f76063c2305586f76

                                                                    SHA256

                                                                    77b138ab5d0a90ff04648c26addd5e414cc178165e3b54a4cb3739da0f58e075

                                                                    SHA512

                                                                    e256f603e67335151bb709294749794e2e3085f4063c623461a0b3decbcca8e620807b707ec9bcbe36dcd7d639c55753da0495be85b4ae5fb6bfc52ab4b284fd

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\down[1]

                                                                    Filesize

                                                                    748B

                                                                    MD5

                                                                    c4f558c4c8b56858f15c09037cd6625a

                                                                    SHA1

                                                                    ee497cc061d6a7a59bb66defea65f9a8145ba240

                                                                    SHA256

                                                                    39e7de847c9f731eaa72338ad9053217b957859de27b50b6474ec42971530781

                                                                    SHA512

                                                                    d60353d3fbea2992d96795ba30b20727b022b9164b2094b922921d33ca7ce1634713693ac191f8f5708954544f7648f4840bcd5b62cb6a032ef292a8b0e52a44

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NSWVVUXL\errorPageStrings[1]

                                                                    Filesize

                                                                    4KB

                                                                    MD5

                                                                    d65ec06f21c379c87040b83cc1abac6b

                                                                    SHA1

                                                                    208d0a0bb775661758394be7e4afb18357e46c8b

                                                                    SHA256

                                                                    a1270e90cea31b46432ec44731bf4400d22b38eb2855326bf934fe8f1b169a4f

                                                                    SHA512

                                                                    8a166d26b49a5d95aea49bc649e5ea58786a2191f4d2adac6f5fbb7523940ce4482d6a2502aa870a931224f215cb2010a8c9b99a2c1820150e4d365cab28299e

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QSO8CY24\dnserror[1]

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    2dc61eb461da1436f5d22bce51425660

                                                                    SHA1

                                                                    e1b79bcab0f073868079d807faec669596dc46c1

                                                                    SHA256

                                                                    acdeb4966289b6ce46ecc879531f85e9c6f94b718aab521d38e2e00f7f7f7993

                                                                    SHA512

                                                                    a88becb4fbddc5afc55e4dc0135af714a3eec4a63810ae5a989f2cecb824a686165d3cedb8cbd8f35c7e5b9f4136c29dea32736aabb451fe8088b978b493ac6d

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\QSO8CY24\httpErrorPagesScripts[1]

                                                                    Filesize

                                                                    11KB

                                                                    MD5

                                                                    9234071287e637f85d721463c488704c

                                                                    SHA1

                                                                    cca09b1e0fba38ba29d3972ed8dcecefdef8c152

                                                                    SHA256

                                                                    65cc039890c7ceb927ce40f6f199d74e49b8058c3f8a6e22e8f916ad90ea8649

                                                                    SHA512

                                                                    87d691987e7a2f69ad8605f35f94241ab7e68ad4f55ad384f1f0d40dc59ffd1432c758123661ee39443d624c881b01dcd228a67afb8700fe5e66fc794a6c0384

                                                                  • C:\Users\Admin\AppData\Local\Temp\temp.bat

                                                                    Filesize

                                                                    232B

                                                                    MD5

                                                                    ca754767517770cb111f822b6a54bb86

                                                                    SHA1

                                                                    e270aa162803ad6514b5975f7d654347368776eb

                                                                    SHA256

                                                                    7462be25adb22cb0d7db4cd0e8d36328e59729463ab2f5fc4961e398bcf2b916

                                                                    SHA512

                                                                    275caf430152b4671379006b319d02c59fc0c154de5a0cbcb68b091886fb001eea6cd1c22985aa2b9c7c1f7b82e7f42bee7de5ec846f3dd8e051ef3347827f03

                                                                  • C:\Users\Admin\AppData\Local\Temp\temp.bat

                                                                    Filesize

                                                                    160B

                                                                    MD5

                                                                    688de2c11d07cd1a0f0a22aaba2f38fe

                                                                    SHA1

                                                                    c693ee247172adf49b1fe68c597358b0e0e2477e

                                                                    SHA256

                                                                    8fd8370941a44a938f35789dae430fe4ee8bb1443f05baad544b48c261ae40d7

                                                                    SHA512

                                                                    d1ecc15e5e1da8d9f35f95ed2b66763ed314e9b523dacd1eb42332b8f3d9c8256f46830c7b9c107ada42cc51d4dfe6ac9cd845b6fdbcf25677c5c50b138bde0a

                                                                  • C:\Users\Admin\AppData\Local\Temp\~DF54DDCE1890CF9638.TMP

                                                                    Filesize

                                                                    16KB

                                                                    MD5

                                                                    41c51b027a3293fb6c9211076c20625d

                                                                    SHA1

                                                                    33221d2ff23257297b08b363ad03ba01902ec6fa

                                                                    SHA256

                                                                    9161eaf48752f44afc7cb7ab617bd3d60b8f19b1f2e8f5cb70a0b147307aa9af

                                                                    SHA512

                                                                    fbded871b069dfe82b2876f16cefb1b4eb969b7e16a17095e359dd27372e6fdba0bc855d34c86301b3b33ec561cd12a393505e325eb0579758899634e8445fee

                                                                  • C:\Users\Admin\AppData\Local\n.ini

                                                                    Filesize

                                                                    19B

                                                                    MD5

                                                                    e415f059d8566da0d8d44108e0e915fe

                                                                    SHA1

                                                                    34dff1c646f465308c2804f0f046bbdcdfb53661

                                                                    SHA256

                                                                    b6765a3102953c72201321bfe2ef838e13e3ce395ef26c72e515a140e6d6d782

                                                                    SHA512

                                                                    fde3978b4d56abe680806dc62e6b9ad7f10ef2c6cbb1c7999c2f64c180056a600b98503446a1f3d2bd46487ef84d9a13ec1f3246d00451610a51af3fb21fec1b

                                                                  • C:\Windows\SysWOW64\wbem\csrss.exe

                                                                    Filesize

                                                                    25KB

                                                                    MD5

                                                                    0671c5cfbd0ea6344d096ad46cf0fe17

                                                                    SHA1

                                                                    33a80b4fb446ab1da6457b018b6b3a9a11a184a4

                                                                    SHA256

                                                                    6c978b13d3a48cb2590123d5fdf3fbf5945ec0a73621caa32af809ffa22b2fa1

                                                                    SHA512

                                                                    085ea0ec4df5e53e1e1fe5981d4b2c457762a4227c08c6ea18c2ec11b293ad132b59a34c380ec034de2ffb5a2858bfefcd8dc8c25f73a7afd0478c40602e8e21

                                                                  • memory/436-26-0x0000000006000000-0x0000000006012000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/436-0-0x0000000006000000-0x0000000006012000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/436-12-0x0000000006000000-0x0000000006012000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/436-1-0x00000000004E0000-0x00000000004E2000-memory.dmp

                                                                    Filesize

                                                                    8KB

                                                                  • memory/1984-246-0x0000000006000000-0x0000000006012000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/1984-232-0x0000000006000000-0x0000000006012000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/2060-104-0x0000000006000000-0x0000000006012000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/2604-67-0x0000000002330000-0x0000000002332000-memory.dmp

                                                                    Filesize

                                                                    8KB

                                                                  • memory/2604-85-0x0000000006000000-0x0000000006012000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/3124-143-0x0000000006000000-0x0000000006012000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/4304-183-0x0000000006000000-0x0000000006012000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/4752-25-0x00000000021F0000-0x00000000021F2000-memory.dmp

                                                                    Filesize

                                                                    8KB

                                                                  • memory/4872-185-0x0000000006000000-0x0000000006012000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/4872-170-0x0000000006000000-0x0000000006012000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/5052-66-0x0000000006000000-0x0000000006012000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/5052-47-0x0000000006000000-0x0000000006012000-memory.dmp

                                                                    Filesize

                                                                    72KB