Analysis

  • max time kernel
    255s
  • max time network
    295s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/01/2024, 05:09

General

  • Target

    f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe

  • Size

    5.4MB

  • MD5

    9152994148ace0cc7c6962b2251d2300

  • SHA1

    1e7ded397e115958acce7801f8e570a1de0e2006

  • SHA256

    f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b

  • SHA512

    8a48233b0b9f01aca0192ec8471b1faae7e8c1edee25aaca9a79a01daf7451a0ab91c1f2b6448aea332bd3ae2330dcfbf54cfcb2340450cd0757d449b95f8f16

  • SSDEEP

    98304:sNTxIQBMEMOup7bJxETJ6+LWx3U+WWdtFpp17lO1CagxktFNhjISLAd+OHNsx:jQ3L6Ho6+Uk+Wup17solsfhsSLi+Px

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe
    "C:\Users\Admin\AppData\Local\Temp\f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:228
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s6c.0.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3868
      • C:\Windows\SysWOW64\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:3256
      • C:\ProgramData\pinterests\XRJNZC.exe
        "C:\ProgramData\pinterests\XRJNZC.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3580
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "XRJNZC" /tr C:\ProgramData\pinterests\XRJNZC.exe /f
          4⤵
          • Creates scheduled task(s)
          PID:3212
  • C:\ProgramData\pinterests\XRJNZC.exe
    C:\ProgramData\pinterests\XRJNZC.exe
    1⤵
    • Executes dropped EXE
    PID:2116
  • C:\ProgramData\pinterests\XRJNZC.exe
    C:\ProgramData\pinterests\XRJNZC.exe
    1⤵
    • Executes dropped EXE
    PID:1936
  • C:\ProgramData\pinterests\XRJNZC.exe
    C:\ProgramData\pinterests\XRJNZC.exe
    1⤵
    • Executes dropped EXE
    PID:4052
  • C:\ProgramData\pinterests\XRJNZC.exe
    C:\ProgramData\pinterests\XRJNZC.exe
    1⤵
    • Executes dropped EXE
    PID:4788
  • C:\ProgramData\pinterests\XRJNZC.exe
    C:\ProgramData\pinterests\XRJNZC.exe
    1⤵
    • Executes dropped EXE
    PID:3192

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\pinterests\XRJNZC.exe

          Filesize

          3KB

          MD5

          2415541e8ebbe11031afaf489457e967

          SHA1

          f4841283f6c559989c77beee0901b8d628e74ef1

          SHA256

          d6b96e78e005f070ac114eef7667027b9595efab1cc4643ede9251a66e384763

          SHA512

          bbf004f10dda598883aa8da5fcf049d66759362e65efb011f850ff737e08e21c074acbbca2cb48d009609173b70f41c8c6d71dc4dcfac5a20c65777c5327a0b7

        • C:\ProgramData\pinterests\XRJNZC.exe

          Filesize

          381KB

          MD5

          c1b9f2599fe24f1931520a7f77587e72

          SHA1

          df1b505be1708d19b339902188267e0c7ae8a753

          SHA256

          2519fbba77201c7b0ea607da3158531b4d57266430c5f0e5838d0dd7dc71e2e6

          SHA512

          fe07b4043f803a1f9e02442d6eb95301aa81c38895dca71a69d1a15c732fc63102bc1b07ec7f12b00ccd04c3aa1b0b6ee6109dd6bdf693e0230d3aae2b401c58

        • memory/228-5-0x0000000000F30000-0x0000000001966000-memory.dmp

          Filesize

          10.2MB

        • memory/228-0-0x0000000000F30000-0x0000000001966000-memory.dmp

          Filesize

          10.2MB

        • memory/1936-37-0x00000000009B0000-0x00000000013E6000-memory.dmp

          Filesize

          10.2MB

        • memory/1936-32-0x00000000009B0000-0x00000000013E6000-memory.dmp

          Filesize

          10.2MB

        • memory/2116-24-0x00000000009B0000-0x00000000013E6000-memory.dmp

          Filesize

          10.2MB

        • memory/2116-29-0x00000000009B0000-0x00000000013E6000-memory.dmp

          Filesize

          10.2MB

        • memory/3192-56-0x00000000009B0000-0x00000000013E6000-memory.dmp

          Filesize

          10.2MB

        • memory/3192-61-0x00000000009B0000-0x00000000013E6000-memory.dmp

          Filesize

          10.2MB

        • memory/3580-21-0x00000000009B0000-0x00000000013E6000-memory.dmp

          Filesize

          10.2MB

        • memory/3580-16-0x00000000009B0000-0x00000000013E6000-memory.dmp

          Filesize

          10.2MB

        • memory/4052-40-0x00000000009B0000-0x00000000013E6000-memory.dmp

          Filesize

          10.2MB

        • memory/4052-45-0x00000000009B0000-0x00000000013E6000-memory.dmp

          Filesize

          10.2MB

        • memory/4788-48-0x00000000009B0000-0x00000000013E6000-memory.dmp

          Filesize

          10.2MB

        • memory/4788-53-0x00000000009B0000-0x00000000013E6000-memory.dmp

          Filesize

          10.2MB