Analysis

  • max time kernel
    136s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 10:32

General

  • Target

    16011a1c58ce95cf18d5f78dbdd6cf6a.exe

  • Size

    695KB

  • MD5

    16011a1c58ce95cf18d5f78dbdd6cf6a

  • SHA1

    7b2ea1ddb346d062a764c6ce1ea5f9e3f4fba1ea

  • SHA256

    14216e53e46a798104fdd40f06dad77fc99dcc8e299b313a9b01b2aefe1aafab

  • SHA512

    34297829b50dd3eb326571236687dc3450d0e80793a0ef0632067c371227726102c8e34fbaa18035b3e78ec782ed91d84e475dc96bce3cf6bdbb05709703493f

  • SSDEEP

    12288:0A2btXr+Y6Q8Qy2Xw9xVtKmRqfXn3XpcGimtzTr3B6qwYaUy43Ie5JD:0AIXrB6VQbg9TtKmRqfX3aGjNcYaUV7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16011a1c58ce95cf18d5f78dbdd6cf6a.exe
    "C:\Users\Admin\AppData\Local\Temp\16011a1c58ce95cf18d5f78dbdd6cf6a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Local\Temp\1432252882.exe
      C:\Users\Admin\AppData\Local\Temp\1432252882.exe 7/7/4/3/1/0/0/5/6/3/8 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3868
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81704028492.txt bios get version
        3⤵
          PID:4144
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81704028492.txt bios get version
          3⤵
            PID:372
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81704028492.txt bios get version
            3⤵
              PID:5116
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              wmic /output:C:\Users\Admin\AppData\Local\Temp\81704028492.txt bios get version
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1780
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 920
              3⤵
              • Program crash
              PID:4524
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81704028492.txt bios get serialnumber
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1560
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3868 -ip 3868
          1⤵
            PID:3240

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\1432252882.exe

                  Filesize

                  924KB

                  MD5

                  4b5ae3b9ca39686a4ded37eb1ef3fc0f

                  SHA1

                  de0038e8e5434c00f0088536989b323fff509e2a

                  SHA256

                  0863bdecf74f7bf2e1d9c7a6ec4c5a62a9576ebd3da0e036eb19f60c5e1c2de2

                  SHA512

                  e871b2692d8b43ed16d0d4e36cea9305187d9b3cf11eaa3ee8eaa7d2b0253cdf446174c3ef9af8d53666fad49fd4a0086c422302cf178e3099923e2a0b945803

                • C:\Users\Admin\AppData\Local\Temp\1432252882.exe

                  Filesize

                  135KB

                  MD5

                  a564632a7f047c5506979a6d865799ad

                  SHA1

                  4682746ab99deab8efa5411538070a57532dba4b

                  SHA256

                  939a08c256aae85e14858a47ccdb3451e95a8a00e5538ef1528db1a022546b8a

                  SHA512

                  c689f3c3f86dba272169d76da562babe4a6b4a0d9866f1de97ea911f13efeac8a58b4f2b148a897e107cf822676d9257437b0781a44a643159ecbd9b730b4e71

                • C:\Users\Admin\AppData\Local\Temp\81704028492.txt

                  Filesize

                  66B

                  MD5

                  9025468f85256136f923096b01375964

                  SHA1

                  7fcd174999661594fa5f88890ffb195e9858cc52

                  SHA256

                  d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

                  SHA512

                  92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

                • C:\Users\Admin\AppData\Local\Temp\81704028492.txt

                  Filesize

                  2B

                  MD5

                  f3b25701fe362ec84616a93a45ce9998

                  SHA1

                  d62636d8caec13f04e28442a0a6fa1afeb024bbb

                  SHA256

                  b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                  SHA512

                  98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                • C:\Users\Admin\AppData\Local\Temp\81704028492.txt

                  Filesize

                  58B

                  MD5

                  dd876faf0fd44a5fab3e82368e2e8b15

                  SHA1

                  01b04083fa278dda3a81705ca5abcfee487a3c90

                  SHA256

                  5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

                  SHA512

                  e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

                • C:\Users\Admin\AppData\Local\Temp\nsxA6C0.tmp\anlfxoa.dll

                  Filesize

                  158KB

                  MD5

                  d0f94ea3f68bfc8ce4fd3e8556fc0f78

                  SHA1

                  801e60468aa4af2588a9446be448f9563b1af554

                  SHA256

                  1b5eb8e1e4f95a32a14328b623fa286b474274d59ebcb3947835b26064c757e7

                  SHA512

                  6a888ad4ec20e377e891820d40a30be40333ad2547f5b7078b8ab1d56bb5fd0d7811e5dfc417b7d46d0f7fef0ca3266870ae05c44cac28bf9a9efd11e108ffb5

                • C:\Users\Admin\AppData\Local\Temp\nsxA6C0.tmp\anlfxoa.dll

                  Filesize

                  142KB

                  MD5

                  a4956ac7c043f2f8261599e596cd43ff

                  SHA1

                  51105dd00d83b38bbb73f91e728d22cf90796b7e

                  SHA256

                  5c0982bcf4a471fe6b8dac2f2ce6e2322a28a813ad0052806022362a25c0cd8f

                  SHA512

                  8b7c66199ecfa670806f402a9a66de93641b44b2269c7b4bca57441393960821dabc18b1d1fe51cd82085f696274c7df93fdc68f611e8cdec056c686c376691e

                • C:\Users\Admin\AppData\Local\Temp\nsxA6C0.tmp\nsisunz.dll

                  Filesize

                  40KB

                  MD5

                  5f13dbc378792f23e598079fc1e4422b

                  SHA1

                  5813c05802f15930aa860b8363af2b58426c8adf

                  SHA256

                  6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

                  SHA512

                  9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

                • C:\Users\Admin\AppData\Local\Temp\nsxA6C0.tmp\nsisunz.dll

                  Filesize

                  10KB

                  MD5

                  7abadf087fd0908edde5bd149d0517b0

                  SHA1

                  44f3393fcae0774bf79e46aeeea58f7bdeabcc57

                  SHA256

                  4e40c62fc22d1fa332585d300e6ad301f384ecfd50d66a335a0a163337c94d33

                  SHA512

                  2f38e74faa57816ac2a684bca0e2649f2f8827868cca11c3b464bbcc62007f34e818a7ad92900ea7d542ef4819b9402e2010ac7c37a999811a044b527229d532