Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 19:09

General

  • Target

    0148b8ba1df6de0f1a76afaa800e4daa.exe

  • Size

    67KB

  • MD5

    0148b8ba1df6de0f1a76afaa800e4daa

  • SHA1

    10f636fa8c79df9f48e42c15db8e141c61af63b6

  • SHA256

    af5b874e8069dbf2f2f8a411c31cc4eb1ca58ed05ef797e2cc1945eb4d1f6356

  • SHA512

    2b17359ddb851a24137868da3f57520a7dc0302e6a7ae501048c62bc3db837ffd3de667d12dacfbc56319d18c099592513d1e3688d66751fc83ee716a15206eb

  • SSDEEP

    1536:ZwqPQJoyTVzmFc//////mY9spPGLaX4KvbSPW7nAb44nKpDG/:JIoQdcc//////4PJX4Kvx7Ab4sCy/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 5 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0148b8ba1df6de0f1a76afaa800e4daa.exe
    "C:\Users\Admin\AppData\Local\Temp\0148b8ba1df6de0f1a76afaa800e4daa.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:64
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del C:\NTDUBECT.EXE
      2⤵
        PID:3488
      • C:\Users\Admin\AppData\Local\Temp\conime.exe
        C:\Users\Admin\AppData\Local\Temp\conime.exe
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies registry class
        PID:4408
      • C:\Windows\SysWOW64\net.exe
        net stop System Restore Service
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3336
      • C:\Windows\SysWOW64\net.exe
        net stop "Windows Firewall/Internet Connection Sharing (ICS)"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2616
      • C:\Windows\SysWOW64\net.exe
        net stop "Security Center"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2664
      • C:\Windows\SysWOW64\net.exe
        net stop System Restore Service
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1932
      • C:\Windows\SysWOW64\net.exe
        net stop "Windows Firewall/Internet Connection Sharing (ICS)"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3632
      • C:\Windows\SysWOW64\net.exe
        net stop "Security Center"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5548
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
      1⤵
        PID:2284
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop System Restore Service
        1⤵
          PID:5596
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Security Center"
          1⤵
            PID:6100
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Security Center"
            1⤵
              PID:5600
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
              1⤵
                PID:400
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop System Restore Service
                1⤵
                  PID:2660

                Network

                MITRE ATT&CK Matrix

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\conime.exe

                  Filesize

                  24KB

                  MD5

                  8397da239709b167fa29444149390586

                  SHA1

                  0e2c4d1ee53042e3e1554bbcda28c50309df8e80

                  SHA256

                  5aff8366ad9cbf3b4ae40eb3a198ac119cd1e94704b0da00fda4e8bd2a1f32fa

                  SHA512

                  7f64b716d0dc7da87359689693d3c17af875346610e2f6a8d5429b592a9196a38ac2fc1c3c1746449d69b5baecd2dc776cd470d653d55eed919df359ff439d57

                • memory/4408-4-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB

                • memory/4408-6-0x0000000000400000-0x0000000000427000-memory.dmp

                  Filesize

                  156KB