Analysis

  • max time kernel
    141s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 03:57

General

  • Target

    27279fef7becb54fd327f2adba9c500a.exe

  • Size

    39KB

  • MD5

    27279fef7becb54fd327f2adba9c500a

  • SHA1

    1b9cb10413b78c4a511c52a71f0b09d494c30b9b

  • SHA256

    6e09b62d4feb68bd347e66b903503958bfb69c5d8f6408d7fe7546cd39ae191d

  • SHA512

    fba971ad288af277be1d7b5b7a0ac112d76ea03f0f73a6a915761aa54236c92f7db2cb5a3b5b12264c353cdbeec53db30bf068ef1bbb76765392263fa947023d

  • SSDEEP

    768:XXmmIlfh2z4MMDa0DUM/YytkxfJCbeT2zDGgRd6+2v2X6MQw/jUg:nmmIZhtblxtSfenDGo4+FXHQMR

Score
8/10

Malware Config

Signatures

  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27279fef7becb54fd327f2adba9c500a.exe
    "C:\Users\Admin\AppData\Local\Temp\27279fef7becb54fd327f2adba9c500a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\Temp\27279fef7becb54fd327f2adba9c500a.exe
      "C:\Users\Admin\AppData\Local\Temp\27279fef7becb54fd327f2adba9c500a.exe"
      2⤵
      • Disables RegEdit via registry modification
      • Drops file in Drivers directory
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:880
      • C:\Windows\SysWOW64\symldvc.exe
        "C:\Windows\system32\symldvc.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Windows\SysWOW64\symldvc.exe
          "C:\Windows\SysWOW64\symldvc.exe"
          4⤵
            PID:2692
        • C:\Windows\SysWOW64\CMD.exe
          CMD /C del /F /S /Q *.zip
          3⤵
            PID:2680
          • C:\Windows\SysWOW64\CMD.exe
            CMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"
            3⤵
              PID:2720
            • C:\Windows\SysWOW64\CMD.exe
              CMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"
              3⤵
                PID:2664
              • C:\Windows\SysWOW64\CMD.exe
                CMD /C del /F /S /Q *.com
                3⤵
                  PID:2688
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\27279F~1.EXE > nul
                  3⤵
                    PID:2880

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • \Windows\SysWOW64\symldvc.exe

                Filesize

                39KB

                MD5

                27279fef7becb54fd327f2adba9c500a

                SHA1

                1b9cb10413b78c4a511c52a71f0b09d494c30b9b

                SHA256

                6e09b62d4feb68bd347e66b903503958bfb69c5d8f6408d7fe7546cd39ae191d

                SHA512

                fba971ad288af277be1d7b5b7a0ac112d76ea03f0f73a6a915761aa54236c92f7db2cb5a3b5b12264c353cdbeec53db30bf068ef1bbb76765392263fa947023d

              • memory/880-0-0x0000000000120000-0x000000000012E000-memory.dmp

                Filesize

                56KB

              • memory/880-2-0x0000000000120000-0x000000000012E000-memory.dmp

                Filesize

                56KB

              • memory/880-4-0x0000000000120000-0x000000000012E000-memory.dmp

                Filesize

                56KB

              • memory/880-7-0x0000000000120000-0x000000000012E000-memory.dmp

                Filesize

                56KB

              • memory/880-10-0x0000000000120000-0x000000000012E000-memory.dmp

                Filesize

                56KB

              • memory/880-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                Filesize

                4KB

              • memory/880-15-0x0000000000120000-0x000000000012E000-memory.dmp

                Filesize

                56KB

              • memory/2572-32-0x0000000000120000-0x0000000000131000-memory.dmp

                Filesize

                68KB

              • memory/2872-14-0x0000000000120000-0x0000000000131000-memory.dmp

                Filesize

                68KB