Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 13:45

General

  • Target

    53ad56559a24a0f43dd025856a56c761.exe

  • Size

    416KB

  • MD5

    53ad56559a24a0f43dd025856a56c761

  • SHA1

    48e30a3a37657db8f3d9d86dee84a5c8472f241a

  • SHA256

    28d87c3b9dcd573c2b44c6bb099e4fba5ced870de54250346c03a337be77f921

  • SHA512

    de13c01e8889deb3b1dd11337581a9b12313eb6f5143c0480f02ecdb9d1ce3282ea8fe2e5222093552b0e514208cf17209381e6049a4be0d46e50403c5bff17c

  • SSDEEP

    12288:09iEGOh63LY9AWp3tQYDJi0BHk++++FN++z+ofH9Q:lmhd9ZpiXIk++++FN++z+0

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 16 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 6 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53ad56559a24a0f43dd025856a56c761.exe
    "C:\Users\Admin\AppData\Local\Temp\53ad56559a24a0f43dd025856a56c761.exe"
    1⤵
    • Modifies firewall policy service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\WINDOWS\juca.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall set notifications Disable
        3⤵
        • Modifies Windows Firewall
        PID:2716
      • C:\Windows\SysWOW64\sc.exe
        sc stop SharedAccess
        3⤵
        • Launches sc.exe
        PID:2864
      • C:\Windows\SysWOW64\sc.exe
        sc config SharedAccess start= disabled
        3⤵
        • Launches sc.exe
        PID:2980
      • C:\Windows\SysWOW64\sc.exe
        sc stop wuauserv
        3⤵
        • Launches sc.exe
        PID:2920
      • C:\Windows\SysWOW64\sc.exe
        sc config SharedAccess start= disabled
        3⤵
        • Launches sc.exe
        PID:2944
      • C:\Windows\SysWOW64\sc.exe
        sc stop wscsvc
        3⤵
        • Launches sc.exe
        PID:2780
      • C:\Windows\SysWOW64\sc.exe
        sc config wscsvc start= disabled
        3⤵
        • Launches sc.exe
        PID:2720
    • C:\WINDOWS\msagent\agtintl\update.exe
      C:\WINDOWS\msagent\agtintl\update.exe
      2⤵
      • Modifies firewall policy service
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22f2311dfb89cdbcddca1389cfd139da

    SHA1

    87547442430f12b2eeb996a6d4574b82cc732636

    SHA256

    c0d2fd2f77ed514e637522b9bf65cd052518dafd17e20c30cddaeef36d5d1664

    SHA512

    77bf7e8803f2a428ef19df787f5338aba2ff99a362f2bcbe59a480d4fe373ebb95a8188c8bef7214af73eda140668f83d54d61d2c74ce0ac1efb12b1b9ebad95

  • C:\Users\Admin\AppData\Local\Temp\Cab9011.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar9053.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Windows\juca.bat

    Filesize

    223B

    MD5

    1604ad01e735f096a9494f3d1590865e

    SHA1

    8894a9efeb44f1c1af4bc09c7d13b19718edfc16

    SHA256

    d40c23e8e65973f2c387e268a0ac7dd3a4358f724cbe3aa51e1fb05c8a837dcf

    SHA512

    58cfb7cb142d0507990f7e60d2cb83eb0395466feba2985569189ea1b62063cd261647a002fcc89af423a12a6ea498735a0887f19498129d7e257e71e289819c

  • \Windows\msagent\agtintl\update.exe

    Filesize

    416KB

    MD5

    53ad56559a24a0f43dd025856a56c761

    SHA1

    48e30a3a37657db8f3d9d86dee84a5c8472f241a

    SHA256

    28d87c3b9dcd573c2b44c6bb099e4fba5ced870de54250346c03a337be77f921

    SHA512

    de13c01e8889deb3b1dd11337581a9b12313eb6f5143c0480f02ecdb9d1ce3282ea8fe2e5222093552b0e514208cf17209381e6049a4be0d46e50403c5bff17c

  • \Windows\msagent\agtintl\update.exe

    Filesize

    182KB

    MD5

    dfd5023ccb6b7953c9f88840d9a8e489

    SHA1

    013f19e401c7ced0234a1aab574138176965a03b

    SHA256

    32525787daed27b85024f5d0afaa00f5fb826363fc4779fcc9f73f6c414d7df5

    SHA512

    364678c6b687114b6610b4088769844783148954c048ebb2243785d743fc570cd9607d4c5fe1fbde8cae1b0ed9b996de607db7691f7b55fd1529baf8c804ebe9

  • \Windows\msagent\agtintl\update.exe

    Filesize

    64KB

    MD5

    2082b022e66f7fd16afce572a3a86fe1

    SHA1

    c76b92cee51db2fbb585ac6a4a709cd0cf178e01

    SHA256

    8596cf5f9d4e98d4580ffd3784af7fcbecd6708acab7aec767c016995d2b14c0

    SHA512

    3d416f882b817980a4980b37c9eece39201cfa94bd04fa19df6075a5baf39ce50769f1d18cd0125faf2655d94ed95907b567099798b39debe97aa70a7b909a19

  • memory/2536-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2536-18-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/2740-20-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB

  • memory/2740-151-0x0000000000400000-0x000000000046F000-memory.dmp

    Filesize

    444KB