Analysis
-
max time kernel
1798s -
max time network
1494s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/01/2024, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
server.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
server.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
server.exe
Resource
win11-20231215-en
General
-
Target
server.exe
-
Size
1.4MB
-
MD5
badc8cbde455d9b56fbe91c28f986ba3
-
SHA1
7fe5d8b6c33a37d02decea07f6ce3a880f659ac1
-
SHA256
d2a44fcb2c471c4e1c8ef74dc87dcade91c0d04d9b23d557b2a3d2ffd0202d27
-
SHA512
47c33947a18c5b7c62f880eecb1ed795c4ab72166afdc3347570b796731b3002eb424c8c0fc346477a53cb077e04658340eaedc9292941a0cfc9bcdcf8806893
-
SSDEEP
24576:oxLsMs8WdUS88xLsMs8WdUS88TsQfxLsMs8WdUS8ysxLsMs8WdUS82lQTTXZ:MsldsAsldss9sldsyQslds2liTJ
Malware Config
Signatures
-
Executes dropped EXE 11 IoCs
pid Process 3864 setup.exe 3584 TMP_1.exe 1112 TMP_2.exe 232 TMP_3.exe 4804 TMP_4.exe 3928 null.exe 412 ver.exe 1436 mblctr.exe 4976 null.exe 2120 ver.exe 2008 mblctr.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4232 schtasks.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 5104 timeout.exe 4584 timeout.exe 1620 timeout.exe -
Kills process with taskkill 2 IoCs
pid Process 404 taskkill.exe 1872 taskkill.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3768 PING.EXE 1948 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1872 taskkill.exe Token: SeDebugPrivilege 404 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 412 ver.exe 2120 ver.exe -
Suspicious use of WriteProcessMemory 58 IoCs
description pid Process procid_target PID 8 wrote to memory of 3864 8 server.exe 79 PID 8 wrote to memory of 3864 8 server.exe 79 PID 8 wrote to memory of 3864 8 server.exe 79 PID 3864 wrote to memory of 1304 3864 setup.exe 89 PID 3864 wrote to memory of 1304 3864 setup.exe 89 PID 1304 wrote to memory of 3584 1304 cmd.exe 82 PID 1304 wrote to memory of 3584 1304 cmd.exe 82 PID 1304 wrote to memory of 3584 1304 cmd.exe 82 PID 1304 wrote to memory of 1112 1304 cmd.exe 86 PID 1304 wrote to memory of 1112 1304 cmd.exe 86 PID 1304 wrote to memory of 1112 1304 cmd.exe 86 PID 1304 wrote to memory of 232 1304 cmd.exe 85 PID 1304 wrote to memory of 232 1304 cmd.exe 85 PID 1304 wrote to memory of 232 1304 cmd.exe 85 PID 1304 wrote to memory of 4804 1304 cmd.exe 84 PID 1304 wrote to memory of 4804 1304 cmd.exe 84 PID 1304 wrote to memory of 4804 1304 cmd.exe 84 PID 1304 wrote to memory of 5104 1304 cmd.exe 83 PID 1304 wrote to memory of 5104 1304 cmd.exe 83 PID 1304 wrote to memory of 4232 1304 cmd.exe 91 PID 1304 wrote to memory of 4232 1304 cmd.exe 91 PID 1304 wrote to memory of 3928 1304 cmd.exe 92 PID 1304 wrote to memory of 3928 1304 cmd.exe 92 PID 1304 wrote to memory of 3928 1304 cmd.exe 92 PID 3928 wrote to memory of 776 3928 null.exe 94 PID 3928 wrote to memory of 776 3928 null.exe 94 PID 776 wrote to memory of 412 776 cmd.exe 95 PID 776 wrote to memory of 412 776 cmd.exe 95 PID 776 wrote to memory of 412 776 cmd.exe 95 PID 776 wrote to memory of 4584 776 cmd.exe 96 PID 776 wrote to memory of 4584 776 cmd.exe 96 PID 412 wrote to memory of 1872 412 ver.exe 97 PID 412 wrote to memory of 1872 412 ver.exe 97 PID 412 wrote to memory of 1872 412 ver.exe 97 PID 776 wrote to memory of 1436 776 cmd.exe 100 PID 776 wrote to memory of 1436 776 cmd.exe 100 PID 776 wrote to memory of 1436 776 cmd.exe 100 PID 1436 wrote to memory of 1848 1436 mblctr.exe 101 PID 1436 wrote to memory of 1848 1436 mblctr.exe 101 PID 1848 wrote to memory of 3768 1848 cmd.exe 103 PID 1848 wrote to memory of 3768 1848 cmd.exe 103 PID 4976 wrote to memory of 2988 4976 null.exe 106 PID 4976 wrote to memory of 2988 4976 null.exe 106 PID 2988 wrote to memory of 2120 2988 cmd.exe 107 PID 2988 wrote to memory of 2120 2988 cmd.exe 107 PID 2988 wrote to memory of 2120 2988 cmd.exe 107 PID 2988 wrote to memory of 1620 2988 cmd.exe 108 PID 2988 wrote to memory of 1620 2988 cmd.exe 108 PID 2120 wrote to memory of 404 2120 ver.exe 109 PID 2120 wrote to memory of 404 2120 ver.exe 109 PID 2120 wrote to memory of 404 2120 ver.exe 109 PID 2988 wrote to memory of 2008 2988 cmd.exe 111 PID 2988 wrote to memory of 2008 2988 cmd.exe 111 PID 2988 wrote to memory of 2008 2988 cmd.exe 111 PID 2008 wrote to memory of 3352 2008 mblctr.exe 112 PID 2008 wrote to memory of 3352 2008 mblctr.exe 112 PID 3352 wrote to memory of 1948 3352 cmd.exe 114 PID 3352 wrote to memory of 1948 3352 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\70DA.tmp\70DB.tmp\70DC.bat C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\system32\schtasks.exeSCHTASKS /Create /sc onidle /i 1 /tn OracleUpdate /tr C:\Users\Admin\AppData\Roaming\Oracle\null.exe4⤵
- Creates scheduled task(s)
PID:4232
-
-
C:\Users\Admin\AppData\Roaming\Oracle\null.exeC:\Users\Admin\AppData\Roaming\Oracle\null.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\B5A4.tmp\B5A5.tmp\B5A6.bat C:\Users\Admin\AppData\Roaming\Oracle\null.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:776 -
C:\ProgramData\Oracle\ver.exeC:\ProgramData\Oracle\ver.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "ver.exe"7⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
-
C:\Windows\system32\timeout.exetimeout 256⤵
- Delays execution with timeout.exe
PID:4584
-
-
C:\ProgramData\Oracle\mblctr.exeC:\ProgramData\Oracle\mblctr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\172D.tmp\172E.tmp\172F.bat C:\ProgramData\Oracle\mblctr.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\system32\PING.EXEping 216.58.209.174 -t -l 655008⤵
- Runs ping.exe
PID:3768
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\TMP_1.exeTMP_1.exe1⤵
- Executes dropped EXE
PID:3584
-
C:\Windows\system32\timeout.exetimeout 171⤵
- Delays execution with timeout.exe
PID:5104
-
C:\Users\Admin\AppData\Local\Temp\TMP_4.exeTMP_4.exe1⤵
- Executes dropped EXE
PID:4804
-
C:\Users\Admin\AppData\Local\Temp\TMP_3.exeTMP_3.exe1⤵
- Executes dropped EXE
PID:232
-
C:\Users\Admin\AppData\Local\Temp\TMP_2.exeTMP_2.exe1⤵
- Executes dropped EXE
PID:1112
-
C:\Users\Admin\AppData\Roaming\Oracle\null.exeC:\Users\Admin\AppData\Roaming\Oracle\null.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\220A.tmp\220B.tmp\220C.bat C:\Users\Admin\AppData\Roaming\Oracle\null.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\ProgramData\Oracle\ver.exeC:\ProgramData\Oracle\ver.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "ver.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
-
C:\Windows\system32\timeout.exetimeout 253⤵
- Delays execution with timeout.exe
PID:1620
-
-
C:\ProgramData\Oracle\mblctr.exeC:\ProgramData\Oracle\mblctr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\843E.tmp\843F.tmp\8440.bat C:\ProgramData\Oracle\mblctr.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\system32\PING.EXEping 216.58.209.174 -t -l 655005⤵
- Runs ping.exe
PID:1948
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31B
MD537e327fb49eca19fd9e7d645f448aef9
SHA1f0706e13faa83b0e61eee140c379cded955bb8f7
SHA256ae2bc8114e5458119304fcecfb105e27921803fca5849856d1d2cfd1fc9274b6
SHA5126da7f17cf360145c7d7303d435bf2afa89bbd661dd1df5328c0ed00c98b4731930273e5f12fe4325f6a19dfed664f035233b2d5902b12bf527f843e3e1b2f3aa
-
Filesize
173KB
MD5ecf80bb163eb2fd9b67f0417a9a48b60
SHA13f6e873c6c298aa5b101d0b472730568f64a8bb3
SHA256b4fa97a98d23a9f1be5327f676f2fe1985124561aa9b1fc1fa432db8c582989b
SHA512ea5d98af577f066f1ca275a354d53a824f1b2caa67b2308576118e29796b6202cb52a46542b19a41b6cbc7d1591c01a14b641b37a5adbd0de54924030fa07078
-
Filesize
32KB
MD5339a704c50db1d4348a13219372dcf82
SHA12a76adb21991a6017cdb2cc5a38080421e6f158c
SHA256f724e20d9b00d5a9c3109388c4154a3ad8449e5486c8feeae306acae432d89a0
SHA5125e69f2e2deca461db47aa149b1b0ab324b57142c6dedc5142abd6c38e5395109c05e763011b5ee0b8749eb41419526f9d148502f1f284fff48969dbf5d2ff492
-
Filesize
45B
MD5d553475bc6ee3789c91ddf834a414451
SHA1ede254d47f7beb1cac697294f3476fee15925fbb
SHA2560d7c42ec32677f3ac29124733f8d8efc5befca5c352db2703157faff3e4d5958
SHA512336c355ec73cb9b6f3260867ef63092056656edd20c96b49876e569c34557f2d1c09d8b413776cb000bd4ba5215df315ee9fd158c3dfd3868a5d80e2c8306186
-
Filesize
185B
MD5627cdb5811123c24df1bcc23c8fbe8c5
SHA160fa8dfa06fdc1510b03f1074e81a506b05e95b5
SHA2563537ca928c5bb2598b2d8268d3d50123d76395d13cd47371d4a39bb8d0624311
SHA512e991d3d403084daf2e481b0b97ab7393aff938cef89427336d2111bede0c27121bd3b4a495c5f0817dd29528ca8bce64f35a40b1536bd8e4cedeb82a06d7889e
-
Filesize
104B
MD5e2bf5b66bd7423fdaf861c6304b1089c
SHA15297b022ea5c0cfa4f2d7414f08262a372e91558
SHA256d99094b54cc899f7068f218bdd413a0794cddf418c32e0d0d8dd8c641c8b7861
SHA5126b17b0bcc9da8f9547bf7cc952d399637d6b9a4213bf68e37487011e5cfcd2a173497d36e520663d484b01bc3ae6903c34b85e17a17c3eea1dd6ce0dc17fa7cb
-
Filesize
279KB
MD522a60b9b1b7613ca33411b8427234c3e
SHA14ef6dfc3a70003a7244e562ea9ed34e26a093d46
SHA2561bb0db868b236ec01778881971cfc0069aa53b1382f0e469242e9da2da4802a8
SHA51267e33c6a4253f1f525ee43087ae896dc281c1efb5864ac4989ad35ffc70c3739302b392b35cf0d2d9d4a65b80aa16643e4f41b2a5241ec848631ed30780856a2
-
Filesize
401KB
MD500db7f83805c09cb5a454b3379eaf236
SHA13c70cbb4b95eed9627cc1de025def6b70e75f726
SHA256cc75eb41e934a43efa6f995118c91b281bb96fc5c9702b7a02ad9ae3e7ec1003
SHA512b2e6c97bd122bd6195b47d7a3696590aaa02d967156d3c4c9ff93aa965daa4417030371fca461704a9ba45b3405fbf63513f2ca06947b1c920adcd4a1ba2ceb5
-
Filesize
289KB
MD5feb910e4d725596dbff0a84b21e487e3
SHA13ebdf913474aa1e896086221c87e24dc445a9c0d
SHA256524c542c27625b475a2a3cc808fe6da8c07fac2a8d5fd059b4e9035a575a4ea3
SHA512a95a137d837d01709a4a71c55980f5492c28f2e45980f9c3befb90b625d1f305ea0ff5e672d115a1b2dd6f30d540b7c6436e665070a39f441d19a59a6bbbb80b
-
Filesize
92KB
MD5ba1ac0b0fa7126612987bf9e15ef99da
SHA1c18dc522b5b2d20e8a158fd9fbcf0d4de29b93c2
SHA2568110a2ef23d32e788268b396fd36b4e2ca348235c43bd4e97618cb473b3869d5
SHA51201914ca17119a7f0ef5036301bffd4a64ffc99c2360c0d1d74143b9340985adb24cb781536692b192ee7c1df9a26e8ea22300b68ff49e31a43b999cc1c124da7
-
Filesize
86KB
MD5e33c414c85c815c08e2096f7e6684e4b
SHA1c97fddd7043d9c9f994741fd8903ca26a58c8a31
SHA256cd6be15da6c568a8b7ffe19eef2fdc67fab0283335021715f9633714ed49c9d6
SHA5121f4468cc606ab04cc23c2f7d0cc45d84cb318afb5e6c2be402f4ff0dcb338a08fd45f1c235eda8786873e6f41434f76b2f49e94d74e59533aaf8c4867a727ea4
-
Filesize
88KB
MD573c8962cd40f16b3df7d07f3181e8648
SHA16770c6d20b6951d461639697909184fb5cc66e1c
SHA256cf160d431d0f90ec244b5f5c0615a0ece40f272175a063782dcae6d11bc457dc
SHA51277f21de9b1c366eeca17ef10db9601723ab4c0794a2e73bfd5161c60408646bf51cea9ea962e60f176bbcabc69d8743d4795001ec323c710eec9731d497d8221