Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    05/01/2024, 23:06

General

  • Target

    44a9a4aab2226603cc8ad4d81dc299fa.exe

  • Size

    2.5MB

  • MD5

    44a9a4aab2226603cc8ad4d81dc299fa

  • SHA1

    ea9219503ca35162bec9304210f77f13c77fd176

  • SHA256

    79f736fc40140c0c94b2da2ec99a437ad827adec22af45ecb8a9af924fa4a739

  • SHA512

    e2d02c2f73b7dede45c97630fef051b118ffba012c2e5c45a590bd96e2281fe7acf3bccf0dfbbfba0dc386daa10ed1dbdbcfa2c050d05c8199dd771a3da5a2d0

  • SSDEEP

    49152:rx+1KHkoWgtR4BY8Z9oTIAdjLLnuPh0wkNQjYiGKmXAvWMPbD67aSZcXw7T7e:rxuekByRGKdjLDuZ0wJjNIMWMPS7Biwy

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 34 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 4 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44a9a4aab2226603cc8ad4d81dc299fa.exe
    "C:\Users\Admin\AppData\Local\Temp\44a9a4aab2226603cc8ad4d81dc299fa.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\AppData\Local\Temp\nst494.tmp\CfosSpeed 4.50 .silverado96..exe
      "C:\Users\Admin\AppData\Local\Temp\nst494.tmp\CfosSpeed 4.50 .silverado96..exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Users\Admin\AppData\Local\Temp\nsd4D2.tmp\Server.exe
        C:\Users\Admin\AppData\Local\Temp\nsd4D2.tmp\Server.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:740
    • C:\Users\Admin\AppData\Local\Temp\nst494.tmp\Server.exe
      C:\Users\Admin\AppData\Local\Temp\nst494.tmp\Server.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1912
  • C:\Users\Admin\AppData\Local\Temp\nsd4D2.tmp\CfosSpeed 4.50 .silverado96..exe
    "C:\Users\Admin\AppData\Local\Temp\nsd4D2.tmp\CfosSpeed 4.50 .silverado96..exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\$cfsfx.0\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\$cfsfx.0\setup.exe" -parentdir:"C:\Users\Admin\AppData\Local\Temp\nsd4D2.tmp\"
      2⤵
        PID:1936
        • C:\Windows\SysWOW64\reg.exe
          reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v WinsysMon /t REG_SZ /d "C:\Windows\SysWOW64\Socks.exe" /f
          3⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:2328
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 stop wscsvc
      1⤵
        PID:2204
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\hi.bat
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        PID:1936
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall set service type = upnp mode = enable
        1⤵
        • Modifies Windows Firewall
        PID:1188
      • C:\Windows\SysWOW64\net.exe
        net stop wscsvc
        1⤵
          PID:2540
        • C:\Windows\SysWOW64\Socks.exe
          C:\Windows\system32\Socks.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1556
        • C:\Windows\SysWOW64\Socks.exe
          C:\Windows\system32\Socks.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1588

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nst494.tmp\CfosSpeed 4.50 .silverado96..exe

          Filesize

          92KB

          MD5

          da714484e6af2535c066022ac933a216

          SHA1

          1ead9f354e746a4e03d9937bdd12dd16ccb26517

          SHA256

          98034fca0023f7a3bdc3588e9aae263383b73cc7b6e1a7f256b1a207491a05b1

          SHA512

          51254f5bf0909020f80ce3f19ba6f5b607a6536fc49654a131e14a238d24418f8e1e183decd2c072bc50cc2345d4a5c911044660b89efbd7ca3a20b7f110afca

        • \Users\Admin\AppData\Local\Temp\nst494.tmp\CfosSpeed 4.50 .silverado96..exe

          Filesize

          384KB

          MD5

          fefbfe5404e0c4e9549b0c4e7c6a9de2

          SHA1

          1f6b01637440590adf989fc459a9f25fa0b4fb85

          SHA256

          f59a477117f48af51ed95c7ad7f8cbf7c0b8aacd6f6ee0a49c5f906067e815df

          SHA512

          3ceadc6f9fe44af1b6043695c54ee211b4a2d374aaefb2e83f8a6b99194ad86049561f5b162c66bf45657ce7b09e4b72afc7b117aaf0a08a0699641981edbd01

        • \Users\Admin\AppData\Local\Temp\nst494.tmp\CfosSpeed 4.50 .silverado96..exe

          Filesize

          382KB

          MD5

          1202cad1cc401fd5d4245e24e7ee83da

          SHA1

          4811d837d6cd9253f75e3cc3a5d8be39a36792ec

          SHA256

          0d8c4b312f628aa1c90679764731cf4e1cfa4f784663971bea998e323cb5e5ca

          SHA512

          1817b0d7f4a3d95932655a12983f59c12cf0a0f215fd057a4f7ae21140d3d989194d9e6511487ee79bc331066d16bdbd7c179b25157bd652d37ed22f2ae76c62