Analysis

  • max time kernel
    1s
  • max time network
    69s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 05:33

General

  • Target

    1014072485c91f77713e68258bf794df.exe

  • Size

    563KB

  • MD5

    1014072485c91f77713e68258bf794df

  • SHA1

    3ba18050f2d3f882a5a0bbf1866542b0730a47f2

  • SHA256

    e8a3fbef6f12cf9a7e499c990bd3ebf5b305c8c7c1aafc7090ffaa9972ffb685

  • SHA512

    4879e702d13e94398a0b0d033b53a89f9418e313369e7e04e324f6605186a981e2611a2a8d82774398b783b5c2ee8d9d9221300cbf6d78a371db1f7b7e0c4f66

  • SSDEEP

    12288:YwX5pxng9W3aOs7ZAl+JcecUDwt4lhKX6OC0puOtOCRJ3:YUpO0ajiAcecUDw+39I

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1014072485c91f77713e68258bf794df.exe
    "C:\Users\Admin\AppData\Local\Temp\1014072485c91f77713e68258bf794df.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Program Files (x86)\CloudWeb\cloudweb_svc.ex_
      "C:\Program Files (x86)\CloudWeb\cloudweb_svc.ex_" /u
      2⤵
      • Executes dropped EXE
      PID:216
    • C:\Program Files (x86)\CloudWeb\cloudweb_svc.ex_
      "C:\Program Files (x86)\CloudWeb\cloudweb_svc.ex_" /stop
      2⤵
      • Executes dropped EXE
      PID:2036
    • C:\Program Files (x86)\CloudWeb\cloudweb_svc.exe
      "C:\Program Files (x86)\CloudWeb\cloudweb_svc.exe" /start
      2⤵
        PID:4956
      • C:\Program Files (x86)\CloudWeb\cloudweb_svc.exe
        "C:\Program Files (x86)\CloudWeb\cloudweb_svc.exe" /i
        2⤵
          PID:904
      • C:\Program Files (x86)\CloudWeb\cloudweb_svc.exe
        "C:\Program Files (x86)\CloudWeb\cloudweb_svc.exe"
        1⤵
          PID:3504

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4920-9-0x0000000002840000-0x00000000028C4000-memory.dmp

          Filesize

          528KB

        • memory/4920-39-0x0000000002CB0000-0x0000000002CCF000-memory.dmp

          Filesize

          124KB

        • memory/4920-52-0x0000000002CF0000-0x0000000002D74000-memory.dmp

          Filesize

          528KB

        • memory/4920-46-0x0000000002CB0000-0x0000000002CD0000-memory.dmp

          Filesize

          128KB