Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 11:03

General

  • Target

    16b1a14639b2af6e19b85f987c10ed16.exe

  • Size

    581KB

  • MD5

    16b1a14639b2af6e19b85f987c10ed16

  • SHA1

    d0e94ec24836b011db56263e64f1d204b92abc25

  • SHA256

    af0516eeca2c217a30aa3130867258efb37941b32fc558ff2c01d8d3b7c22de2

  • SHA512

    f5535d40ba5fd71bb84dffa73349987624c267c095853f50d263bb3c9101f30775e50fb54f0a31f66145d65f5aa15aac3deca67ade1e333e34a6a65e2108c402

  • SSDEEP

    12288:0orLOfbfw892zPjQ6BVfCrvjHaQqMETxfPGa7znERAXl8ifyNLt:0oGTliDwrvba8Elh7rxlHKR

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16b1a14639b2af6e19b85f987c10ed16.exe
    "C:\Users\Admin\AppData\Local\Temp\16b1a14639b2af6e19b85f987c10ed16.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Users\Admin\AppData\Local\Temp\1431799351.exe
      C:\Users\Admin\AppData\Local\Temp\1431799351.exe 5^4^7^2^8^9^8^2^7^1^0 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704044028.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2940
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704044028.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2844
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704044028.txt bios get version
        3⤵
          PID:2628
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81704044028.txt bios get version
          3⤵
            PID:2480
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81704044028.txt bios get version
            3⤵
              PID:2816
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 372
              3⤵
              • Loads dropped DLL
              • Program crash
              PID:2396

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\81704044028.txt

                Filesize

                66B

                MD5

                9025468f85256136f923096b01375964

                SHA1

                7fcd174999661594fa5f88890ffb195e9858cc52

                SHA256

                d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

                SHA512

                92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

              • C:\Users\Admin\AppData\Local\Temp\81704044028.txt

                Filesize

                2B

                MD5

                f3b25701fe362ec84616a93a45ce9998

                SHA1

                d62636d8caec13f04e28442a0a6fa1afeb024bbb

                SHA256

                b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                SHA512

                98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

              • C:\Users\Admin\AppData\Local\Temp\81704044028.txt

                Filesize

                58B

                MD5

                dd876faf0fd44a5fab3e82368e2e8b15

                SHA1

                01b04083fa278dda3a81705ca5abcfee487a3c90

                SHA256

                5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

                SHA512

                e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

              • \Users\Admin\AppData\Local\Temp\1431799351.exe

                Filesize

                788KB

                MD5

                345ca014b03f2ddd5c0a5632bcedbaf7

                SHA1

                6b56b46e96c2899c69d2fd49cd1f7223fd02120a

                SHA256

                77131302b75e2a2b33446713e6ce8c7a79380a1df8be31ca8eca63f2b3ad7ea3

                SHA512

                1dfcfa33b684e11a3393b8190a39e667593f13a5e9852d2069eb362caf8ff287cf3b0f34b4abe5ea86b75eeb082458a9da7541fc773a1a3ed1710eb96ab4e170

              • \Users\Admin\AppData\Local\Temp\1431799351.exe

                Filesize

                704KB

                MD5

                ebc25365d30c34524120f08d99d70df9

                SHA1

                25724a41ddd09ecc1d94f171e271f3fe4cfcb283

                SHA256

                165a00fe759cc2461ae6b55e28c692ad0488838a7bd8d2a4a609f3304999dde5

                SHA512

                f2272e71137b86a6acac13b3da1a4368c6ecad0035f3a2a01decb3a2272c5c8f204c7fdcd3357b5e8b505682e0a0bfd97f6dd33047aaa1013a8adaa5ed1a4838

              • \Users\Admin\AppData\Local\Temp\1431799351.exe

                Filesize

                455KB

                MD5

                9dc5d8e5cf9224c1294795fb7c0d5765

                SHA1

                bacefbda582a15f9ff59ada1dfcc6301ef10b124

                SHA256

                2e6ef1609239674b18dcbbd62fc82ac277e1cebb7b4ed22b029c15888f258b56

                SHA512

                81a0253603b6e8481b6d732ee3b7f816787ed6d0bfaa02088765c788b4542eef3036486fb801ba6ea258541e36f5a8c44a8aa9d886433ffff3099ac204b24d81

              • \Users\Admin\AppData\Local\Temp\nsi42CB.tmp\ibbbywk.dll

                Filesize

                153KB

                MD5

                0ec43130a05cbe9a126c50efc3d2771d

                SHA1

                360e4dd81a32aecd3fb4cab67b8cc786f41fa2dd

                SHA256

                f1f2d35cd64a8b1faf3bb5260d2d18b5e1c22b28b4c9b30a215bd39b626d77ed

                SHA512

                d2d19dfc18051fab5f449b071206d9d5a73d41d8b7e91e42056de20ae0208d8b957272d068f5e2b12faefd2b3456874dd2f682b14f505a6d5cec9d44781f5b14

              • \Users\Admin\AppData\Local\Temp\nsi42CB.tmp\nsisunz.dll

                Filesize

                40KB

                MD5

                5f13dbc378792f23e598079fc1e4422b

                SHA1

                5813c05802f15930aa860b8363af2b58426c8adf

                SHA256

                6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

                SHA512

                9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5