Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 10:18

General

  • Target

    15a83b57ec05ad38e4c14f8710bd8873.exe

  • Size

    694KB

  • MD5

    15a83b57ec05ad38e4c14f8710bd8873

  • SHA1

    bb1a9a3a7e2fdc7c3c6f8ea3c081c8b28183cfa2

  • SHA256

    1026e860ce62280d2ed35f37280f8e42e79ab694ef4c4b30718dbdfe306b4b82

  • SHA512

    dbc6204c9466f171be409d56d9bb26659b594457592c2954beecc7d8fa19dc04ca716a87c52fb434e1f8d894a32ec285e64513ee69ecc3721ced520404d81cc1

  • SSDEEP

    12288:qY43eEvlkuSYi0ydxhP5vA0pj+HQkIBhEtpx3Ocz1j5yOV2slLgUM+fc8vy4h1p:qYOOuSYivrhP5o0iIoLjDyOVXl1K86+p

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15a83b57ec05ad38e4c14f8710bd8873.exe
    "C:\Users\Admin\AppData\Local\Temp\15a83b57ec05ad38e4c14f8710bd8873.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Users\Admin\AppData\Local\Temp\bedgeeddeb.exe
      C:\Users\Admin\AppData\Local\Temp\bedgeeddeb.exe 6|8|7|0|7|0|2|5|7|7|3 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 368
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2944
  • C:\Windows\SysWOW64\Wbem\wmic.exe
    wmic /output:C:\Users\Admin\AppData\Local\Temp\81704161500.txt bios get version
    1⤵
      PID:2592
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic /output:C:\Users\Admin\AppData\Local\Temp\81704161500.txt bios get version
      1⤵
        PID:2596
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704161500.txt bios get version
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2912
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704161500.txt bios get version
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2680
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704161500.txt bios get serialnumber
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2688

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads