Analysis

  • max time kernel
    117s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 22:40

General

  • Target

    05e24ae035290c443e0de41727659ca7.exe

  • Size

    1.2MB

  • MD5

    05e24ae035290c443e0de41727659ca7

  • SHA1

    e3b9824f3794844197b7ed4e0691ff6cc5b4e741

  • SHA256

    15b6694cf28dadb2bfd04438010f8a6823626860385dc6b44b90a5a560ea0480

  • SHA512

    5d500b48d44cb8c01ed28d5f1941a29625cb4f60ea7d5974376c9385d2ac80a37043b260d06f8e7c4e006de5c69a2f2c2e27b664a3afb8954ba20644bde4249b

  • SSDEEP

    24576:3bSaE4mvt/p638OBuwruqzEkFJOzugReSNkFc1:3bSv4mvz6huVqzoazT0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05e24ae035290c443e0de41727659ca7.exe
    "C:\Users\Admin\AppData\Local\Temp\05e24ae035290c443e0de41727659ca7.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      "C:\Users\Admin\AppData\Local\Temp\File.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1628
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81703912518.txt bios get serialnumber
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2680
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81703912518.txt bios get version
    1⤵
      PID:2276
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 368
      1⤵
      • Loads dropped DLL
      • Program crash
      PID:2300
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic /output:C:\Users\Admin\AppData\Local\Temp\81703912518.txt bios get version
      1⤵
        PID:2264
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703912518.txt bios get version
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1564
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81703912518.txt bios get version
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1588
      • C:\Users\Admin\AppData\Local\Temp\1432220532.exe
        C:\Users\Admin\AppData\Local\Temp\1432220532.exe 1/7/9/6/7/9/9/5/0/9/3 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
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2760

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\378B079587A9184B2E2AB859CB263F40_524AD1B9B08D3C6450727265AE77B7D2

        Filesize

        5B

        MD5

        5bfa51f3a417b98e7443eca90fc94703

        SHA1

        8c015d80b8a23f780bdd215dc842b0f5551f63bd

        SHA256

        bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

        SHA512

        4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

      • memory/2940-1-0x0000000000C80000-0x0000000000D00000-memory.dmp

        Filesize

        512KB

      • memory/2940-0-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

        Filesize

        9.6MB

      • memory/2940-65-0x000000001B040000-0x000000001B0B8000-memory.dmp

        Filesize

        480KB

      • memory/2940-100-0x0000000000C80000-0x0000000000D00000-memory.dmp

        Filesize

        512KB