Analysis

  • max time kernel
    157s
  • max time network
    199s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 05:12

General

  • Target

    2980953553f9fd4c8415badabc96279d.exe

  • Size

    84KB

  • MD5

    2980953553f9fd4c8415badabc96279d

  • SHA1

    76637d6ec3ca792758a201c16f46ac1b0aaa900e

  • SHA256

    6c09c29f1df8b16b0674db9e9e24b82c4664f5c8d1c1286ec08dd3b58c4e0480

  • SHA512

    7cac9d58ac264d7151b4f75d2deec0f2f0105596debed06d17f0729fb11181bd766cca6f23caba96b30ca537870d7ebe4e5bbcb760c9533928a4ba3e0d830f59

  • SSDEEP

    1536:OEGY8ykXkdrYu8EDcM2dJBNNY9MX+GGj8K2pizxCO0C+1ZudbPyglkLYIe:5x8ykY8xdJWMRGIKVzF8v4lgYIe

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2980953553f9fd4c8415badabc96279d.exe
    "C:\Users\Admin\AppData\Local\Temp\2980953553f9fd4c8415badabc96279d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 236221174 /t REG_SZ /d "%userprofile%\236221174.exe" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 236221174 /t REG_SZ /d "C:\Users\Admin\236221174.exe" /f
        3⤵
        • Adds Run key to start application
        PID:1080
    • C:\Windows\SysWOW64\shutdown.exe
      "C:\Windows\System32\shutdown.exe" /r /f /t 3
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1372
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\298095~1.EXE > nul
      2⤵
      • Deletes itself
      PID:1048
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:1196
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:2300

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1196-8-0x0000000002A80000-0x0000000002A81000-memory.dmp

        Filesize

        4KB

      • memory/2300-9-0x0000000002760000-0x0000000002761000-memory.dmp

        Filesize

        4KB

      • memory/2664-0-0x00000000000A0000-0x00000000000AE000-memory.dmp

        Filesize

        56KB

      • memory/2664-3-0x0000000000360000-0x0000000000383000-memory.dmp

        Filesize

        140KB

      • memory/2664-1-0x0000000000130000-0x0000000000137000-memory.dmp

        Filesize

        28KB