Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2024 15:21

General

  • Target

    53dfcaa40638683ee5c04f95673274ba.exe

  • Size

    791KB

  • MD5

    53dfcaa40638683ee5c04f95673274ba

  • SHA1

    84dc1f5df8f719660ab016e30f13cfd1fb9e51ca

  • SHA256

    39cb4858c187bac6fa4e874ca525328a84ad6ebef099dd0255c78da51fd65bbd

  • SHA512

    64ca0454086ae7e6afe89e14d8da17d2a4adb7d9bef88cd5460cb4b4062d55e9ab3f525b65659535e0ad8ee85a3befd745ff7a3e0baad060f8ce58d3707a16c2

  • SSDEEP

    6144:cpqoa8aLiC/2OLSAN7gNVpNleQUohBfGPOtQciXeL/XYqGlebojSP2pjNhcYYnCH:cpqiC/2OGAtkCP4cejGSOpRKPCnIi

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53dfcaa40638683ee5c04f95673274ba.exe
    "C:\Users\Admin\AppData\Local\Temp\53dfcaa40638683ee5c04f95673274ba.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops autorun.inf file
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C AT /delete /yes
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Windows\SysWOW64\at.exe
        AT /delete /yes
        3⤵
          PID:2252
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Users\Admin\Desktop\system3_.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4744
        • C:\Windows\SysWOW64\at.exe
          AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Users\Admin\Desktop\system3_.exe
          3⤵
            PID:852
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /C cacls "C:\system volume information" /e /g "Admin":f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4992
          • C:\Windows\SysWOW64\cacls.exe
            cacls "C:\system volume information" /e /g "Admin":f
            3⤵
              PID:2976
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /C cacls "C:\system volume information" /e /g "Admin":f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4356
            • C:\Windows\SysWOW64\cacls.exe
              cacls "C:\system volume information" /e /g "Admin":f
              3⤵
                PID:3252

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\Desktop\autorun.ini

            Filesize

            102B

            MD5

            948c74cd98911b420ff89dac13399bcb

            SHA1

            76dfc73518f003953923b1b4f2b973f4bb56a411

            SHA256

            94a1ac3d574425ec8a3cc01675e4d787373d2a190dddd4f8ba507c49ca3fd42a

            SHA512

            b31d82ede9d48e390a50a9dcf5c4c607c62638e8bc56f473250f9a56b7967d5de948abed69bbb2c35eb0112288faa5c438316b06ccbb36d289e93952b30e2ede

          • C:\Users\Admin\Desktop\system3_.exe

            Filesize

            791KB

            MD5

            53dfcaa40638683ee5c04f95673274ba

            SHA1

            84dc1f5df8f719660ab016e30f13cfd1fb9e51ca

            SHA256

            39cb4858c187bac6fa4e874ca525328a84ad6ebef099dd0255c78da51fd65bbd

            SHA512

            64ca0454086ae7e6afe89e14d8da17d2a4adb7d9bef88cd5460cb4b4062d55e9ab3f525b65659535e0ad8ee85a3befd745ff7a3e0baad060f8ce58d3707a16c2

          • memory/624-0-0x0000000000400000-0x00000000004DC000-memory.dmp

            Filesize

            880KB