Resubmissions

08/01/2024, 11:43

240108-nv4arahadp 10

07/01/2024, 19:42

240107-ye6faadgc5 10

Analysis

  • max time kernel
    1s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 19:42

General

  • Target

  • Size

    3.4MB

  • MD5

    84c82835a5d21bbcf75a61706d8ab549

  • SHA1

    5ff465afaabcbf0150d1a3ab2c2e74f3a4426467

  • SHA256

    ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa

  • SHA512

    90723a50c20ba3643d625595fd6be8dcf88d70ff7f4b4719a88f055d5b3149a4231018ea30d375171507a147e59f73478c0c27948590794554d031e7d54b7244

  • SSDEEP

    98304:QqPoBhz1aRxcSUDk36SAEdhvxWa9P593R8yAVp2g3x:QqPe1Cxcxk3ZAEUadzR8yc4gB

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\[email protected]
    "C:\Users\Admin\AppData\Local\Temp\[email protected]"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\SysWOW64\attrib.exe
      attrib +h .
      2⤵
      • Views/modifies file attributes
      PID:2908
    • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
      taskdl.exe
      2⤵
      • Executes dropped EXE
      PID:2348
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c 251131704656600.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2136
    • C:\Windows\SysWOW64\attrib.exe
      attrib +h +s F:\$RECYCLE
      2⤵
      • Views/modifies file attributes
      PID:1612
    • C:\Windows\SysWOW64\icacls.exe
      icacls . /grant Everyone:F /T /C /Q
      2⤵
      • Modifies file permissions
      PID:2800
    • C:\Users\Admin\AppData\Local\Temp\@[email protected]
      PID:1476
      • C:\Users\Admin\AppData\Local\Temp\TaskData\Tor\taskhsvc.exe
        TaskData\Tor\taskhsvc.exe
        3⤵
          PID:836
      • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
        taskdl.exe
        2⤵
          PID:2796
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "nnzzsvcjqe067" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\tasksche.exe\"" /f
          2⤵
            PID:3004
          • C:\Users\Admin\AppData\Local\Temp\taskse.exe
            taskse.exe C:\Users\Admin\AppData\Local\Temp\@[email protected]
            2⤵
              PID:2808
            • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
              taskdl.exe
              2⤵
                PID:2148
              • C:\Users\Admin\AppData\Local\Temp\taskse.exe
                taskse.exe C:\Users\Admin\AppData\Local\Temp\@[email protected]
                2⤵
                  PID:2132
                • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
                  taskdl.exe
                  2⤵
                    PID:1012
                  • C:\Users\Admin\AppData\Local\Temp\taskse.exe
                    taskse.exe C:\Users\Admin\AppData\Local\Temp\@[email protected]
                    2⤵
                      PID:1640
                    • C:\Users\Admin\AppData\Local\Temp\taskdl.exe
                      taskdl.exe
                      2⤵
                        PID:868
                      • C:\Users\Admin\AppData\Local\Temp\taskse.exe
                        taskse.exe C:\Users\Admin\AppData\Local\Temp\@[email protected]
                        2⤵
                          PID:1504
                      • C:\Windows\SysWOW64\cscript.exe
                        cscript.exe //nologo m.vbs
                        1⤵
                          PID:2872
                        • C:\Users\Admin\AppData\Local\Temp\@[email protected]
                          PID:2084
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
                            2⤵
                              PID:904
                          • C:\Windows\SysWOW64\vssadmin.exe
                            vssadmin delete shadows /all /quiet
                            1⤵
                            • Interacts with shadow copies
                            PID:1332
                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                            wmic shadowcopy delete
                            1⤵
                              PID:1988
                            • C:\Windows\system32\vssvc.exe
                              C:\Windows\system32\vssvc.exe
                              1⤵
                                PID:3064
                              • C:\Windows\SysWOW64\reg.exe
                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "nnzzsvcjqe067" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\tasksche.exe\"" /f
                                1⤵
                                • Modifies registry key
                                PID:2712

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • memory/836-980-0x00000000748E0000-0x0000000074AFC000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/836-995-0x00000000011A0000-0x000000000149E000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/836-967-0x0000000074B80000-0x0000000074C02000-memory.dmp

                                Filesize

                                520KB

                              • memory/836-969-0x00000000748E0000-0x0000000074AFC000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/836-973-0x00000000011A0000-0x000000000149E000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/836-972-0x0000000074820000-0x0000000074842000-memory.dmp

                                Filesize

                                136KB

                              • memory/836-971-0x0000000074850000-0x00000000748D2000-memory.dmp

                                Filesize

                                520KB

                              • memory/836-970-0x00000000011A0000-0x000000000149E000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/836-968-0x0000000074820000-0x0000000074842000-memory.dmp

                                Filesize

                                136KB

                              • memory/836-966-0x0000000074850000-0x00000000748D2000-memory.dmp

                                Filesize

                                520KB

                              • memory/836-964-0x0000000074B80000-0x0000000074C02000-memory.dmp

                                Filesize

                                520KB

                              • memory/836-976-0x00000000011A0000-0x000000000149E000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/836-981-0x0000000074850000-0x00000000748D2000-memory.dmp

                                Filesize

                                520KB

                              • memory/836-1080-0x00000000011A0000-0x000000000149E000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/836-965-0x00000000748E0000-0x0000000074AFC000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/836-977-0x0000000074B80000-0x0000000074C02000-memory.dmp

                                Filesize

                                520KB

                              • memory/836-979-0x0000000074B00000-0x0000000074B77000-memory.dmp

                                Filesize

                                476KB

                              • memory/836-983-0x00000000011A0000-0x000000000149E000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/836-991-0x00000000011A0000-0x000000000149E000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/836-978-0x00000000752F0000-0x000000007530C000-memory.dmp

                                Filesize

                                112KB

                              • memory/836-1006-0x00000000748E0000-0x0000000074AFC000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/836-1002-0x00000000011A0000-0x000000000149E000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/836-1010-0x00000000011A0000-0x000000000149E000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/836-1068-0x00000000748E0000-0x0000000074AFC000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/836-1064-0x00000000011A0000-0x000000000149E000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/836-1076-0x00000000748E0000-0x0000000074AFC000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/836-1072-0x00000000011A0000-0x000000000149E000-memory.dmp

                                Filesize

                                3.0MB

                              • memory/836-1084-0x00000000748E0000-0x0000000074AFC000-memory.dmp

                                Filesize

                                2.1MB

                              • memory/2504-44-0x0000000010000000-0x0000000010010000-memory.dmp

                                Filesize

                                64KB