Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 23:15

General

  • Target

    06a462d6b2b108b95caf23fa3df2002c.exe

  • Size

    633KB

  • MD5

    06a462d6b2b108b95caf23fa3df2002c

  • SHA1

    3dc5530359cc98cec6eb2d236997af9bdcd78e35

  • SHA256

    8914a240f54716fc64201eb512016be680193beff2d0de388d6c8e70c22a4ac9

  • SHA512

    7290197f497f8b90c3cdd68d2697fdece45a485db7a3e8b32f2f623acdb062d3be15ecf2832e028ea60b4d7965e0b37723448d16f62d1d15fdc7a298219006c2

  • SSDEEP

    12288:ltCRQVJayLaG1RO3F3AJIVXHZtjt+GiyB5KvWuZcEJYc0h:ltI4aynOVAJIlrM8KvvZY3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06a462d6b2b108b95caf23fa3df2002c.exe
    "C:\Users\Admin\AppData\Local\Temp\06a462d6b2b108b95caf23fa3df2002c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Local\Temp\1430740920.exe
      C:\Users\Admin\AppData\Local\Temp\1430740920.exe 7!0!5!6!0!5!5!8!3!1!9 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703919081.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2664
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703919081.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2720
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703919081.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2584
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703919081.txt bios get version
        3⤵
          PID:2616
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703919081.txt bios get version
          3⤵
            PID:2608
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 372
            3⤵
            • Loads dropped DLL
            • Program crash
            PID:2440

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\81703919081.txt

        Filesize

        66B

        MD5

        9025468f85256136f923096b01375964

        SHA1

        7fcd174999661594fa5f88890ffb195e9858cc52

        SHA256

        d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

        SHA512

        92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

      • \Users\Admin\AppData\Local\Temp\1430740920.exe

        Filesize

        928KB

        MD5

        8a4a2f8744cf562856cd5e62622a14f7

        SHA1

        08619135a9eaa824bb80822858cf0584d4451747

        SHA256

        496bf95dfc14b171fa345f90c36eab489755b72ba040a818c643bce9af710bb4

        SHA512

        41191bb4c6c571dad53ac8b45d233f875b829498f81b481b70d7a82dfe4ef5b5e41b1ffdc10418b5a7d651dd041e4a146f5ea9da335cf1f21780eb05f5c63073

      • \Users\Admin\AppData\Local\Temp\nsd84CA.tmp\dsvfr.dll

        Filesize

        126KB

        MD5

        c77a97b9a08e2e742170cc1aa7c2fcb1

        SHA1

        98d637e1f3cf0fdebd74bf821aaf43bd42590a06

        SHA256

        e9f06c5e19f0682473abc1f73fd7c400dbb0d79124c161f4f863a2be7249ac72

        SHA512

        f73d8ba2dc2bb0707edbc0ba1fd9b89742fc91f787c5c58f9243dad42a2de64d655bd34068d3a92a7630810249f3fdeb389b2318a3d1482f29b5ce79e0fbc575

      • \Users\Admin\AppData\Local\Temp\nsd84CA.tmp\nsisunz.dll

        Filesize

        40KB

        MD5

        5f13dbc378792f23e598079fc1e4422b

        SHA1

        5813c05802f15930aa860b8363af2b58426c8adf

        SHA256

        6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

        SHA512

        9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5