Analysis

  • max time kernel
    1s
  • max time network
    81s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 22:34

General

  • Target

    1e95e087ddc336bc8cc038866c629537.exe

  • Size

    411KB

  • MD5

    1e95e087ddc336bc8cc038866c629537

  • SHA1

    68ff0f62b626aae7f11d5a1d7e2f7906cbe1a606

  • SHA256

    567b94bcdaea498b72ea3b4193d16a0eeb6807a02fefe59b9b87d0ae03d8dcd4

  • SHA512

    5e999094124243fccb6ed9f4eda9df203e527ca48c6d01126258b16c9f9b2546e6e4bb9a89db6b8e49cab71f3ec8625e42d2f3245603d0e3229df6b766ce0c15

  • SSDEEP

    12288:nPCNpaWbDrPHwfoXjRrPzD1lbMoKGRtq:Pd+8Uj5PnjbMoKD

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e95e087ddc336bc8cc038866c629537.exe
    "C:\Users\Admin\AppData\Local\Temp\1e95e087ddc336bc8cc038866c629537.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1632
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\explorer.exe"
      2⤵
        PID:4656
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
          3⤵
            PID:4772
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
              4⤵
                PID:4832
            • C:\Users\Admin\AppData\Local\Temp\System\nvxdsinc.exe
              "C:\Users\Admin\AppData\Local\Temp\System\nvxdsinc.exe"
              3⤵
                PID:5108
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
            1⤵
              PID:3316
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
                2⤵
                  PID:4528
              • C:\Windows\SysWOW64\timeout.exe
                timeout 5
                1⤵
                • Delays execution with timeout.exe
                PID:1720
              • C:\Users\Admin\AppData\Local\Temp\System\nwtray.exe
                "C:\Users\Admin\AppData\Local\Temp\System\nwtray.exe"
                1⤵
                  PID:1400
                • C:\Windows\SysWOW64\timeout.exe
                  timeout 5
                  1⤵
                  • Delays execution with timeout.exe
                  PID:1296

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/1400-45-0x00000000745E0000-0x0000000074B91000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1400-55-0x00000000745E0000-0x0000000074B91000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1400-56-0x0000000000EF0000-0x0000000000F00000-memory.dmp

                  Filesize

                  64KB

                • memory/1400-41-0x00000000745E0000-0x0000000074B91000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1400-42-0x0000000000EF0000-0x0000000000F00000-memory.dmp

                  Filesize

                  64KB

                • memory/1400-47-0x00000000745E0000-0x0000000074B91000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1632-13-0x00000000745E0000-0x0000000074B91000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1632-2-0x00000000745E0000-0x0000000074B91000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1632-0-0x00000000745E0000-0x0000000074B91000-memory.dmp

                  Filesize

                  5.7MB

                • memory/1632-1-0x0000000000EC0000-0x0000000000ED0000-memory.dmp

                  Filesize

                  64KB

                • memory/3316-48-0x0000000000400000-0x0000000000457000-memory.dmp

                  Filesize

                  348KB

                • memory/4656-52-0x00000000745E0000-0x0000000074B91000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4656-14-0x00000000745E0000-0x0000000074B91000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4656-15-0x00000000745E0000-0x0000000074B91000-memory.dmp

                  Filesize

                  5.7MB

                • memory/4772-21-0x0000000000400000-0x0000000000457000-memory.dmp

                  Filesize

                  348KB

                • memory/4772-23-0x0000000000400000-0x0000000000457000-memory.dmp

                  Filesize

                  348KB

                • memory/5108-37-0x0000000001360000-0x0000000001370000-memory.dmp

                  Filesize

                  64KB

                • memory/5108-53-0x00000000745E0000-0x0000000074B91000-memory.dmp

                  Filesize

                  5.7MB

                • memory/5108-54-0x0000000001360000-0x0000000001370000-memory.dmp

                  Filesize

                  64KB

                • memory/5108-38-0x00000000745E0000-0x0000000074B91000-memory.dmp

                  Filesize

                  5.7MB

                • memory/5108-36-0x00000000745E0000-0x0000000074B91000-memory.dmp

                  Filesize

                  5.7MB