Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 20:48

General

  • Target

    548b99c7ec0059f88b2cfb3028ac71e1.exe

  • Size

    46KB

  • MD5

    548b99c7ec0059f88b2cfb3028ac71e1

  • SHA1

    78a869e6e4c2e9bf3a51d63917f470569d88753b

  • SHA256

    72a29552834c59b6c49d08e3e75a31d517531edc9fdf2b50f96ebe6fbc6de14b

  • SHA512

    11437c73d6ca52abe6a699f63b76ede2fc9361d14c0555cf8e5fb0e0dbb7a5ce06f20bc594808073f48ec0128707b903cfe8374ed2e2a823b85eeaa2e79fe42e

  • SSDEEP

    768:Ps+M1PzSw++TvQJHsHkiKLMB/p68VszmHAqs9wqv/+P7GzkRt/qL/Co03TCkDLHx:0+aSNZJXibNjM9wI/M7Gzk72/CpDCuR

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\548b99c7ec0059f88b2cfb3028ac71e1.exe
    "C:\Users\Admin\AppData\Local\Temp\548b99c7ec0059f88b2cfb3028ac71e1.exe"
    1⤵
    • Sets service image path in registry
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\KillMe.bat
      2⤵
      • Deletes itself
      PID:2892
  • C:\Windows\SysWOW64\kusn33sd.exe
    C:\Windows\SysWOW64\kusn33sd.exe -j
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:2732

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\KillMe.bat

          Filesize

          211B

          MD5

          a70d574e50ec7509658f838fdf3cbd2e

          SHA1

          cf4d17cd835749c42fc112e00c3b19de113ab2b0

          SHA256

          441990fab5b65344230738fbbd033eaeac6f5e835924600c987362911f8d01c7

          SHA512

          6773ef498479926a24085cad5f1e1ab2aae2091c5ac165dae13afbbd13cb82e2a4d5f2c6fd5258843c3caf38e160eced1798ade0fbfc5f534058936c3dbd45d5

        • C:\Windows\SysWOW64\kusn33sd.exe

          Filesize

          46KB

          MD5

          548b99c7ec0059f88b2cfb3028ac71e1

          SHA1

          78a869e6e4c2e9bf3a51d63917f470569d88753b

          SHA256

          72a29552834c59b6c49d08e3e75a31d517531edc9fdf2b50f96ebe6fbc6de14b

          SHA512

          11437c73d6ca52abe6a699f63b76ede2fc9361d14c0555cf8e5fb0e0dbb7a5ce06f20bc594808073f48ec0128707b903cfe8374ed2e2a823b85eeaa2e79fe42e

        • memory/2108-0-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-12-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2732-3-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2732-15-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB