Analysis

  • max time kernel
    161s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 01:15

General

  • Target

    09c44485af177aa1bb76fea91191330c.exe

  • Size

    354KB

  • MD5

    09c44485af177aa1bb76fea91191330c

  • SHA1

    a63703680517936c3d0a6821e78fb046cafe721a

  • SHA256

    41b9b1489cc9c5df2cd33eb4f9292710b25c0072299d81d2c58c75b2296cfa70

  • SHA512

    8638a3a9de27c1de9a4f011e99383305d7274374b5807ba21f7abc55784d643855add0be4655cf0c97a8c60205577e236cf11324c9c4214ae18cc463a6b8fa73

  • SSDEEP

    6144:X+nkuDHol98+X3AnyxAtr2dDyqBpHu2OmkhPu/FLohiQctoDd9ijquYCMB:unkJl9vXQyxAtKdDyqfH5Ojh2QR2jzhM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09c44485af177aa1bb76fea91191330c.exe
    "C:\Users\Admin\AppData\Local\Temp\09c44485af177aa1bb76fea91191330c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4872
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat
        3⤵
          PID:4512
    • C:\Windows\Hacker.com.cn.exe
      C:\Windows\Hacker.com.cn.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        2⤵
          PID:4152

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE

        Filesize

        293KB

        MD5

        d74072ab5ed37c3e9105eb94b677e1ad

        SHA1

        a880c968426889592fa4c29596c27f1de4672dbd

        SHA256

        049b0fd88d0322bf7d20a90b14b6a7a9db33e54a35d9dd4ac4523791b424b6c2

        SHA512

        78687e58e7283ef8a1349211ea6578201a220b3f084b6903ae435c3475b33a596adad2d02212585adb250bf6bed27efc00e45d8cf4df73cc77e4613f41598e2d

      • C:\Windows\uninstal.bat

        Filesize

        164B

        MD5

        924ea7ae6df752587469376459875c51

        SHA1

        ec5fa69c7e5dcaf5b57eefadc4f25a8e4ae073e1

        SHA256

        46c715ac82d5774479b760757498ddb0b9f75cebc116a3da81f9e438bc9bbb09

        SHA512

        ea7b176a411b82faf5fcd785c67180f88f9ff28f7e24c4f4b49f8e7cdc99fb60e38722b61547a4291bdd2c56b3729045c2e8d4afbecfe03612ab0dd8a7b6ae35

      • memory/1836-0-0x0000000001000000-0x00000000010B7000-memory.dmp

        Filesize

        732KB

      • memory/1836-3-0x0000000001000000-0x00000000010B7000-memory.dmp

        Filesize

        732KB

      • memory/1836-17-0x0000000001000000-0x00000000010B7000-memory.dmp

        Filesize

        732KB

      • memory/2368-15-0x0000000000770000-0x0000000000771000-memory.dmp

        Filesize

        4KB

      • memory/2368-19-0x0000000000400000-0x00000000004C6200-memory.dmp

        Filesize

        792KB

      • memory/2368-20-0x0000000000770000-0x0000000000771000-memory.dmp

        Filesize

        4KB

      • memory/4872-7-0x0000000000400000-0x00000000004C6200-memory.dmp

        Filesize

        792KB

      • memory/4872-8-0x0000000002280000-0x0000000002281000-memory.dmp

        Filesize

        4KB

      • memory/4872-16-0x0000000000400000-0x00000000004C6200-memory.dmp

        Filesize

        792KB