Analysis

  • max time kernel
    5s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 05:09

General

  • Target

    f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe

  • Size

    5.4MB

  • MD5

    9152994148ace0cc7c6962b2251d2300

  • SHA1

    1e7ded397e115958acce7801f8e570a1de0e2006

  • SHA256

    f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b

  • SHA512

    8a48233b0b9f01aca0192ec8471b1faae7e8c1edee25aaca9a79a01daf7451a0ab91c1f2b6448aea332bd3ae2330dcfbf54cfcb2340450cd0757d449b95f8f16

  • SSDEEP

    98304:sNTxIQBMEMOup7bJxETJ6+LWx3U+WWdtFpp17lO1CagxktFNhjISLAd+OHNsx:jQ3L6Ho6+Uk+Wup17solsfhsSLi+Px

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe
    "C:\Users\Admin\AppData\Local\Temp\f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\s1yw.0.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\ProgramData\pinterests\XRJNZC.exe
        "C:\ProgramData\pinterests\XRJNZC.exe"
        3⤵
        • Executes dropped EXE
        PID:2800
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "XRJNZC" /tr C:\ProgramData\pinterests\XRJNZC.exe /f
          4⤵
          • Creates scheduled task(s)
          PID:2740
  • C:\Windows\SysWOW64\timeout.exe
    timeout 3
    1⤵
    • Delays execution with timeout.exe
    PID:2724
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {7AD561CC-724A-4A5F-A483-F8B4C05DE1B8} S-1-5-21-3601492379-692465709-652514833-1000:CALKHSYM\Admin:Interactive:[1]
    1⤵
      PID:2716
      • C:\ProgramData\pinterests\XRJNZC.exe
        C:\ProgramData\pinterests\XRJNZC.exe
        2⤵
          PID:1152
        • C:\ProgramData\pinterests\XRJNZC.exe
          C:\ProgramData\pinterests\XRJNZC.exe
          2⤵
            PID:2920
          • C:\ProgramData\pinterests\XRJNZC.exe
            C:\ProgramData\pinterests\XRJNZC.exe
            2⤵
              PID:1540
            • C:\ProgramData\pinterests\XRJNZC.exe
              C:\ProgramData\pinterests\XRJNZC.exe
              2⤵
                PID:268
              • C:\ProgramData\pinterests\XRJNZC.exe
                C:\ProgramData\pinterests\XRJNZC.exe
                2⤵
                  PID:2364

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/268-50-0x0000000000DF0000-0x0000000001826000-memory.dmp

                Filesize

                10.2MB

              • memory/268-45-0x0000000000DF0000-0x0000000001826000-memory.dmp

                Filesize

                10.2MB

              • memory/1152-29-0x0000000000DF0000-0x0000000001826000-memory.dmp

                Filesize

                10.2MB

              • memory/1152-34-0x0000000000DF0000-0x0000000001826000-memory.dmp

                Filesize

                10.2MB

              • memory/1540-58-0x0000000000DF0000-0x0000000001826000-memory.dmp

                Filesize

                10.2MB

              • memory/1540-53-0x0000000000DF0000-0x0000000001826000-memory.dmp

                Filesize

                10.2MB

              • memory/2364-66-0x0000000000DF0000-0x0000000001826000-memory.dmp

                Filesize

                10.2MB

              • memory/2364-61-0x0000000000DF0000-0x0000000001826000-memory.dmp

                Filesize

                10.2MB

              • memory/2552-5-0x00000000012D0000-0x0000000001D06000-memory.dmp

                Filesize

                10.2MB

              • memory/2552-0-0x00000000012D0000-0x0000000001D06000-memory.dmp

                Filesize

                10.2MB

              • memory/2800-26-0x0000000000DF0000-0x0000000001826000-memory.dmp

                Filesize

                10.2MB

              • memory/2800-21-0x0000000000DF0000-0x0000000001826000-memory.dmp

                Filesize

                10.2MB

              • memory/2920-42-0x0000000000DF0000-0x0000000001826000-memory.dmp

                Filesize

                10.2MB

              • memory/2920-37-0x0000000000DF0000-0x0000000001826000-memory.dmp

                Filesize

                10.2MB