Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 22:47

General

  • Target

    1181cfd2b34e7be8a43ea7335ae541ee72c2fb50ab86c1ca0155864965766a55.exe

  • Size

    37KB

  • MD5

    c9888d06d21e682ae62498e24880d139

  • SHA1

    1dd9679e1792468116e7da109fdf3a89a4fa1bb2

  • SHA256

    1181cfd2b34e7be8a43ea7335ae541ee72c2fb50ab86c1ca0155864965766a55

  • SHA512

    205e2ed37e809bf7e7db818b5f55d99bfcaba55d3875301e5fb77285fb1e1c977b11ddd34358773145add1f405330f3b426b0c8bd0ab64600007e866c0ebc9ce

  • SSDEEP

    768:MetU1hGx8VAXQul37B5t8Rsr55U9EuB6SLFo5:M+uM5iCc9Po4O5

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1181cfd2b34e7be8a43ea7335ae541ee72c2fb50ab86c1ca0155864965766a55.exe
    "C:\Users\Admin\AppData\Local\Temp\1181cfd2b34e7be8a43ea7335ae541ee72c2fb50ab86c1ca0155864965766a55.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\cc"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:2192
    • C:\Windows\System32\attrib.exe
      "C:\Windows\System32\attrib.exe" +s +h "C:\Users\Admin\AppData\Roaming\cc\$77cc.exe"
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:2204
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp6F47.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Users\Admin\AppData\Roaming\cc\$77cc.exe
        "C:\Users\Admin\AppData\Roaming\cc\$77cc.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Windows\system32\schtasks.exe
          "schtasks.exe" /query /TN $77cc.exe
          4⤵
            PID:2468
          • C:\Windows\system32\schtasks.exe
            "schtasks.exe" /Create /SC ONCE /TN "$77cc.exe" /TR "C:\Users\Admin\AppData\Roaming\cc\$77cc.exe \"\$77cc.exe\" /AsAdmin" /ST 00:01 /IT /F /RL HIGHEST
            4⤵
            • Creates scheduled task(s)
            PID:2420
          • C:\Windows\system32\schtasks.exe
            "schtasks.exe" /query /TN $77cc.exe
            4⤵
              PID:2480
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe,bat,dll,ps1;exit
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2896
      • C:\Windows\system32\timeout.exe
        timeout 3
        1⤵
        • Delays execution with timeout.exe
        PID:2352

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\tmp6F47.tmp.bat

              Filesize

              152B

              MD5

              1df8cc66bd904883fdb4c3d232f8c979

              SHA1

              3144b66ade2b5359a0e5e1de3c6b7b64e6cbaf0c

              SHA256

              eaa1b363e116ec6ace23d840bf768a88538ca6498330ddb667a55b50ae846bb0

              SHA512

              d5aec2fe6ea2c5f4cbb9829c0a485f932a060d1be3577e01bdbeef416cb83571703a245d25baa1be171b6f0e96e0f665b331520d891e2f43e121020af184b6a5

            • \Users\Admin\AppData\Roaming\cc\$77cc.exe

              Filesize

              37KB

              MD5

              c9888d06d21e682ae62498e24880d139

              SHA1

              1dd9679e1792468116e7da109fdf3a89a4fa1bb2

              SHA256

              1181cfd2b34e7be8a43ea7335ae541ee72c2fb50ab86c1ca0155864965766a55

              SHA512

              205e2ed37e809bf7e7db818b5f55d99bfcaba55d3875301e5fb77285fb1e1c977b11ddd34358773145add1f405330f3b426b0c8bd0ab64600007e866c0ebc9ce

            • memory/2320-1-0x000007FEF50F0000-0x000007FEF5ADC000-memory.dmp

              Filesize

              9.9MB

            • memory/2320-2-0x000000001BAB0000-0x000000001BB30000-memory.dmp

              Filesize

              512KB

            • memory/2320-3-0x000007FEF50F0000-0x000007FEF5ADC000-memory.dmp

              Filesize

              9.9MB

            • memory/2320-13-0x000007FEF50F0000-0x000007FEF5ADC000-memory.dmp

              Filesize

              9.9MB

            • memory/2320-0-0x000000013F300000-0x000000013F30C000-memory.dmp

              Filesize

              48KB

            • memory/2696-33-0x000007FEF4700000-0x000007FEF50EC000-memory.dmp

              Filesize

              9.9MB

            • memory/2696-18-0x000000013F5A0000-0x000000013F5AC000-memory.dmp

              Filesize

              48KB

            • memory/2696-19-0x000007FEF4700000-0x000007FEF50EC000-memory.dmp

              Filesize

              9.9MB

            • memory/2696-34-0x0000000000660000-0x00000000006E0000-memory.dmp

              Filesize

              512KB

            • memory/2896-25-0x0000000001D80000-0x0000000001D88000-memory.dmp

              Filesize

              32KB

            • memory/2896-28-0x0000000002E30000-0x0000000002EB0000-memory.dmp

              Filesize

              512KB

            • memory/2896-27-0x0000000002E30000-0x0000000002EB0000-memory.dmp

              Filesize

              512KB

            • memory/2896-31-0x0000000002E30000-0x0000000002EB0000-memory.dmp

              Filesize

              512KB

            • memory/2896-30-0x0000000002E34000-0x0000000002E37000-memory.dmp

              Filesize

              12KB

            • memory/2896-29-0x000007FEED5A0000-0x000007FEEDF3D000-memory.dmp

              Filesize

              9.6MB

            • memory/2896-32-0x000007FEED5A0000-0x000007FEEDF3D000-memory.dmp

              Filesize

              9.6MB

            • memory/2896-26-0x000007FEED5A0000-0x000007FEEDF3D000-memory.dmp

              Filesize

              9.6MB

            • memory/2896-24-0x000000001B760000-0x000000001BA42000-memory.dmp

              Filesize

              2.9MB