Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 19:09

General

  • Target

    0148b8ba1df6de0f1a76afaa800e4daa.exe

  • Size

    67KB

  • MD5

    0148b8ba1df6de0f1a76afaa800e4daa

  • SHA1

    10f636fa8c79df9f48e42c15db8e141c61af63b6

  • SHA256

    af5b874e8069dbf2f2f8a411c31cc4eb1ca58ed05ef797e2cc1945eb4d1f6356

  • SHA512

    2b17359ddb851a24137868da3f57520a7dc0302e6a7ae501048c62bc3db837ffd3de667d12dacfbc56319d18c099592513d1e3688d66751fc83ee716a15206eb

  • SSDEEP

    1536:ZwqPQJoyTVzmFc//////mY9spPGLaX4KvbSPW7nAb44nKpDG/:JIoQdcc//////4PJX4Kvx7Ab4sCy/

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 5 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0148b8ba1df6de0f1a76afaa800e4daa.exe
    "C:\Users\Admin\AppData\Local\Temp\0148b8ba1df6de0f1a76afaa800e4daa.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\SysWOW64\net.exe
      net stop "Security Center"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
          PID:2900
      • C:\Windows\SysWOW64\net.exe
        net stop System Restore Service
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2460
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop System Restore Service
          3⤵
            PID:2652
        • C:\Windows\SysWOW64\net.exe
          net stop "Security Center"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2912
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Security Center"
            3⤵
              PID:2684
          • C:\Windows\SysWOW64\net.exe
            net stop "Windows Firewall/Internet Connection Sharing (ICS)"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2772
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
              3⤵
                PID:2704
            • C:\Windows\SysWOW64\net.exe
              net stop "Windows Firewall/Internet Connection Sharing (ICS)"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2656
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
                3⤵
                  PID:1240
              • C:\Windows\SysWOW64\net.exe
                net stop System Restore Service
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2744
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop System Restore Service
                  3⤵
                    PID:2724
                • C:\Users\Admin\AppData\Local\Temp\conime.exe
                  C:\Users\Admin\AppData\Local\Temp\conime.exe
                  2⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Modifies registry class
                  PID:2800
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c del C:\NTDUBECT.EXE
                  2⤵
                  • Deletes itself
                  PID:2632

              Network

              MITRE ATT&CK Matrix

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\conime.exe

                Filesize

                24KB

                MD5

                8397da239709b167fa29444149390586

                SHA1

                0e2c4d1ee53042e3e1554bbcda28c50309df8e80

                SHA256

                5aff8366ad9cbf3b4ae40eb3a198ac119cd1e94704b0da00fda4e8bd2a1f32fa

                SHA512

                7f64b716d0dc7da87359689693d3c17af875346610e2f6a8d5429b592a9196a38ac2fc1c3c1746449d69b5baecd2dc776cd470d653d55eed919df359ff439d57

              • memory/1664-11-0x00000000003A0000-0x00000000003C7000-memory.dmp

                Filesize

                156KB

              • memory/1664-8-0x00000000003A0000-0x00000000003C7000-memory.dmp

                Filesize

                156KB

              • memory/1664-12-0x00000000003A0000-0x00000000003C7000-memory.dmp

                Filesize

                156KB

              • memory/2800-10-0x0000000000400000-0x0000000000427000-memory.dmp

                Filesize

                156KB