Analysis

  • max time kernel
    1s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2023 12:57

General

  • Target

    8f.exe

  • Size

    3.8MB

  • MD5

    0f98fd6b7bf409d245491235c3b3a235

  • SHA1

    e4e7d35342ad925c3777648dcc5b928996c5132a

  • SHA256

    8f5670e8e840235bda7a41acc5df942faa6e995ff5f63d09a5cad39592afaaa1

  • SHA512

    853da359d4f59d15bcb54cee950622762cf628923e9f74676f29e8e23597e693a2d58f8965ba4ac9a2a323741324bdf79a8ac54b1d8d9b9a62499b2c32a8648b

  • SSDEEP

    98304:JO6busnsQw2+V6joFxBY0NX3UHdq+pqmav:J7bussB2I6joFjY0NkHHsmav

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 16 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f.exe
    "C:\Users\Admin\AppData\Local\Temp\8f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\syswow64\rundll32.exe
      "C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#61 C:\Users\Admin\AppData\Local\Temp\8f.exe
      2⤵
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2488-36-0x0000000003360000-0x00000000034A0000-memory.dmp

    Filesize

    1.2MB

  • memory/2488-10-0x0000000003360000-0x00000000034A0000-memory.dmp

    Filesize

    1.2MB

  • memory/2488-13-0x0000000003360000-0x00000000034A0000-memory.dmp

    Filesize

    1.2MB

  • memory/2488-0-0x0000000002870000-0x0000000003079000-memory.dmp

    Filesize

    8.0MB

  • memory/2488-34-0x0000000002870000-0x0000000003079000-memory.dmp

    Filesize

    8.0MB

  • memory/2488-15-0x0000000077970000-0x0000000077971000-memory.dmp

    Filesize

    4KB

  • memory/2488-19-0x0000000003360000-0x00000000034A0000-memory.dmp

    Filesize

    1.2MB

  • memory/2488-18-0x0000000003360000-0x00000000034A0000-memory.dmp

    Filesize

    1.2MB

  • memory/2488-35-0x0000000000400000-0x00000000007DB000-memory.dmp

    Filesize

    3.9MB

  • memory/2488-1-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/2488-9-0x0000000003360000-0x00000000034A0000-memory.dmp

    Filesize

    1.2MB

  • memory/2488-3-0x0000000002870000-0x0000000003079000-memory.dmp

    Filesize

    8.0MB

  • memory/2488-11-0x0000000002870000-0x0000000003079000-memory.dmp

    Filesize

    8.0MB

  • memory/2488-2-0x0000000003360000-0x00000000034A0000-memory.dmp

    Filesize

    1.2MB

  • memory/2488-4-0x0000000003360000-0x00000000034A0000-memory.dmp

    Filesize

    1.2MB

  • memory/2488-5-0x00000000003D0000-0x00000000003D1000-memory.dmp

    Filesize

    4KB

  • memory/2488-14-0x0000000003360000-0x00000000034A0000-memory.dmp

    Filesize

    1.2MB

  • memory/2488-6-0x0000000003360000-0x00000000034A0000-memory.dmp

    Filesize

    1.2MB

  • memory/2488-7-0x0000000003360000-0x00000000034A0000-memory.dmp

    Filesize

    1.2MB

  • memory/2488-8-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2488-12-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2788-24-0x0000000002800000-0x0000000002940000-memory.dmp

    Filesize

    1.2MB

  • memory/2788-31-0x0000000002990000-0x0000000003199000-memory.dmp

    Filesize

    8.0MB

  • memory/2788-29-0x0000000002990000-0x0000000003199000-memory.dmp

    Filesize

    8.0MB

  • memory/2788-33-0x0000000002990000-0x0000000003199000-memory.dmp

    Filesize

    8.0MB

  • memory/2788-32-0x0000000002990000-0x0000000003199000-memory.dmp

    Filesize

    8.0MB

  • memory/2788-30-0x0000000002990000-0x0000000003199000-memory.dmp

    Filesize

    8.0MB

  • memory/2788-28-0x0000000002990000-0x0000000003199000-memory.dmp

    Filesize

    8.0MB

  • memory/2788-27-0x0000000002990000-0x0000000003199000-memory.dmp

    Filesize

    8.0MB

  • memory/2788-16-0x00000000001C0000-0x00000000008A9000-memory.dmp

    Filesize

    6.9MB

  • memory/2788-20-0x0000000000A30000-0x0000000000A31000-memory.dmp

    Filesize

    4KB

  • memory/2788-26-0x0000000002990000-0x0000000003199000-memory.dmp

    Filesize

    8.0MB

  • memory/2788-22-0x0000000002800000-0x0000000002940000-memory.dmp

    Filesize

    1.2MB

  • memory/2788-23-0x0000000002990000-0x0000000003199000-memory.dmp

    Filesize

    8.0MB

  • memory/2788-25-0x0000000002990000-0x0000000003199000-memory.dmp

    Filesize

    8.0MB

  • memory/2788-21-0x00000000001C0000-0x00000000008A9000-memory.dmp

    Filesize

    6.9MB

  • memory/2788-38-0x0000000002990000-0x0000000003199000-memory.dmp

    Filesize

    8.0MB