Analysis

  • max time kernel
    148s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2024, 05:49

General

  • Target

    42e9984ed63e96b0be1b2b29b0468b58.exe

  • Size

    24KB

  • MD5

    42e9984ed63e96b0be1b2b29b0468b58

  • SHA1

    e004c096953dd984b0232300370c49714fe3e574

  • SHA256

    f9b89c3740fa50b2f14732d18360ef2e67ac9ae77191c7c28cd31c9b9a7ad037

  • SHA512

    807f0ee117dbd3caa11f089e354e6fb4106c8acd46c1bf69ec83cafbb3205311ee285bcd4898c67f0a68ba5291461ae9302f742906bbc86bb65129b44253daa4

  • SSDEEP

    384:E3eVES+/xwGkRKJ/lM61qmTTMVF9/q50z0:bGS+ZfbJ/O8qYoAH

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42e9984ed63e96b0be1b2b29b0468b58.exe
    "C:\Users\Admin\AppData\Local\Temp\42e9984ed63e96b0be1b2b29b0468b58.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4512
  • C:\Windows\SysWOW64\cmd.exe
    cmd /c set
    1⤵
      PID:3636
    • C:\Windows\SysWOW64\tasklist.exe
      tasklist
      1⤵
      • Enumerates processes with tasklist
      • Suspicious use of AdjustPrivilegeToken
      PID:2872
    • C:\Windows\SysWOW64\NETSTAT.EXE
      netstat -an
      1⤵
      • Gathers network information
      • Suspicious use of AdjustPrivilegeToken
      PID:2352
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 start
      1⤵
        PID:4780
      • C:\Windows\SysWOW64\net.exe
        net start
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1692
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /all
        1⤵
        • Gathers network information
        PID:1708

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • \??\c:\windows\temp\flash.log

              Filesize

              15KB

              MD5

              b5f91410315f0f291aa9aac1b340587c

              SHA1

              fcec7b4210be33867e792f820bbf57d4cbe824a5

              SHA256

              1ade0d077ff450dc2bd22ce689d59018d5acfe19fa0f4c76fdf1ffb87b208b5c

              SHA512

              1266c6db4313f6ef320a044ac20cc93992038a68057a756f850e926fca560e21977f93066815fb7102a463ef02d3bca3426a2a36d05593e986607488792f67fa