Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    02-01-2024 23:07

General

  • Target

    b57fe599791c010401a65bd6064dfd0ea26c71853999077198056bb821a8d1a4.exe

  • Size

    2.5MB

  • MD5

    da5ffbe5ca612a03fadbcef8f3fd38de

  • SHA1

    0b12f1b7bda89f18f84586e31e4ffde1e3379847

  • SHA256

    b57fe599791c010401a65bd6064dfd0ea26c71853999077198056bb821a8d1a4

  • SHA512

    5028c09cce60a102f9ab92e035e5595c825e9c962a744ac1c0e3fcab39f46413ad9745b193508b5c6ffb301b8e752d3c585a9f25a068e0169a8bc72f8f959f87

  • SSDEEP

    49152:X95tQNQaAGEbSFfSgf6uW1govv74BKHcJiUnJ/i+1oHeXvshN:X952bA1kWuWdvzMXtJ/i+1oHUshN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b57fe599791c010401a65bd6064dfd0ea26c71853999077198056bb821a8d1a4.exe
    "C:\Users\Admin\AppData\Local\Temp\b57fe599791c010401a65bd6064dfd0ea26c71853999077198056bb821a8d1a4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2340
  • C:\Windows\system32\mode.com
    mode 65,10
    1⤵
      PID:2552
    • C:\Users\Admin\AppData\Local\Temp\main\Installer.exe
      "Installer.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1472
    • C:\Windows\system32\attrib.exe
      attrib +H "Installer.exe"
      1⤵
      • Views/modifies file attributes
      PID:2464
    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
      7z.exe e extracted/file_1.zip -oextracted
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:1940
    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
      7z.exe e extracted/file_2.zip -oextracted
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:2728
    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
      7z.exe e extracted/file_3.zip -oextracted
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:2468
    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
      7z.exe e extracted/file_4.zip -oextracted
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:2680
    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
      7z.exe e file.zip -p202360552045190481288228861 -oextracted
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      PID:2568

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • C:\Users\Admin\AppData\Local\Temp\main\file.bin

      Filesize

      1.1MB

      MD5

      cd54ef30090ff1e8c449f7c7d7215bb4

      SHA1

      96bdc05d74b6a4b5b2fad53ca055a41a00b54c8d

      SHA256

      7303ea7bed83e033ffcb0dc60c24c96795d2b61910440c28766ae821cd4bbd44

      SHA512

      9bff1a610688a1c76cebab8cb25a0849c6fda5e888f7d2b5370e8c0f8b91e8efb81c78b179a885a4753b321dc778728f4330a115b6db568d80990ec830898861

    • C:\Users\Admin\AppData\Local\Temp\main\main.bat

      Filesize

      473B

      MD5

      337d64af42edcd311737a1b90961c0f9

      SHA1

      f8d629e57d670e009266a4fcbfdc940e41105194

      SHA256

      5540d82644dc8e4dc4009a54aba5e2545959aa802f5d9e05da549aeec0d7f5fc

      SHA512

      2fc15093cf7ff815998116987b71037799d4e7c4d97564e3c320c57349feb3b13af9770dbcd19b54bb6ad3186ba8b9d1abdef406d582db71cdd460cd81a85601

    • \Users\Admin\AppData\Local\Temp\main\7z.dll

      Filesize

      92KB

      MD5

      acffdc31f6d80f204375147644fd3437

      SHA1

      4ca721f135c4f31dfec93554c30d751a9cccca3d

      SHA256

      13a926262a6388325d8118a0eb15e425d91252262b8bd79f87c1f8a42bedb81f

      SHA512

      b30bde48bf91010ad5aaefb63ff800124df7734ac80b68a582943371c04db3c9b4e54bfe46e2675b05ce0e7a1ab625f554711d3cb0967e13f3fa443924a75237

    • memory/1472-97-0x0000000000090000-0x000000000009C000-memory.dmp

      Filesize

      48KB

    • memory/1472-99-0x0000000000090000-0x000000000009C000-memory.dmp

      Filesize

      48KB

    • memory/1472-103-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1472-106-0x0000000000090000-0x000000000009C000-memory.dmp

      Filesize

      48KB

    • memory/1472-107-0x0000000000090000-0x000000000009C000-memory.dmp

      Filesize

      48KB

    • memory/1472-108-0x0000000073930000-0x000000007401E000-memory.dmp

      Filesize

      6.9MB

    • memory/1472-109-0x0000000004EC0000-0x0000000004F00000-memory.dmp

      Filesize

      256KB

    • memory/1472-110-0x0000000073930000-0x000000007401E000-memory.dmp

      Filesize

      6.9MB

    • memory/2472-96-0x0000000000300000-0x0000000000400000-memory.dmp

      Filesize

      1024KB