Analysis

  • max time kernel
    11s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/01/2024, 11:35

General

  • Target

    5b22ffad0a238d71952d60010852386b.exe

  • Size

    442KB

  • MD5

    5b22ffad0a238d71952d60010852386b

  • SHA1

    031e873003ac4380004269b6f22d2dfc1581bacd

  • SHA256

    a88b53bcd90870eccd0429e4232ce4b4eb11745117248397fa4d40a8d85d0e8e

  • SHA512

    d57b20b531e6a0a1a78f4571d129a126e949ad71c9f3385164f83436818d74cfa00cfb8c084407e3b616d9627d3e9767ddfbbe78358d7b75bb812f2e8e8de68d

  • SSDEEP

    12288:w61aABLUzgOw6UVnYtsAXejgrqHUvZmVxF2:LpVaUVnYtsAu8u1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • Views/modifies file attributes 1 TTPs 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b22ffad0a238d71952d60010852386b.exe
    "C:\Users\Admin\AppData\Local\Temp\5b22ffad0a238d71952d60010852386b.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3572
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\windows\ime\125.bat
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /t /im ksafetray.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1776
      • \??\c:\windows\ime\rar.exe
        "c:\windows\ime\Rar.exe" e -y -ping c:\windows\ime\usbhard.rar c:\windows\ime\
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:4956
      • \??\c:\windows\ime\systen.exe
        c:\windows\ime\systen.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2760
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c c:\windows\ime\ok1.bat
          4⤵
            PID:2352
            • \??\c:\windows\web\lsoss.exe
              c:\windows\web\lsoss.exe
              5⤵
                PID:5044
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\windows\ime\00.vbs"
            3⤵
              PID:2204
            • C:\Windows\SysWOW64\attrib.exe
              attrib +H +R g:\setprter
              3⤵
              • Views/modifies file attributes
              PID:1820
            • C:\Windows\SysWOW64\attrib.exe
              attrib +H +R h:\setprter
              3⤵
              • Views/modifies file attributes
              PID:408
            • C:\Windows\SysWOW64\attrib.exe
              attrib -H -R h:\~1
              3⤵
              • Views/modifies file attributes
              PID:884
            • C:\Windows\SysWOW64\attrib.exe
              attrib -H -R g:\~1
              3⤵
              • Views/modifies file attributes
              PID:2232
            • C:\Windows\SysWOW64\attrib.exe
              attrib +H +R f:\setprter
              3⤵
              • Views/modifies file attributes
              PID:4680
            • C:\Windows\SysWOW64\attrib.exe
              attrib -H -R f:\~1
              3⤵
              • Views/modifies file attributes
              PID:2204
            • C:\Windows\SysWOW64\attrib.exe
              attrib +H +R e:\setprter
              3⤵
              • Views/modifies file attributes
              PID:2740
            • C:\Windows\SysWOW64\attrib.exe
              attrib -H -R e:\~1
              3⤵
              • Views/modifies file attributes
              PID:980
            • C:\Windows\SysWOW64\attrib.exe
              attrib +H +R d:\setprter
              3⤵
              • Views/modifies file attributes
              PID:4492
            • C:\Windows\SysWOW64\attrib.exe
              attrib -H -R d:\~1
              3⤵
              • Views/modifies file attributes
              PID:4516
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\11a.bat
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4364
            • C:\Windows\SysWOW64\PING.EXE
              ping 127.0.0.1 -n 1
              3⤵
              • Runs ping.exe
              PID:4560
            • C:\Windows\SysWOW64\attrib.exe
              attrib -S -H c:\ma.exe
              3⤵
              • Views/modifies file attributes
              PID:3108
        • C:\windows\ime\rar.exe
          "C:\windows\ime\Rar.exe" e -y -ping C:\windows\ime\ok.rar c:\windows\web\
          1⤵
            PID:980
          • C:\Windows\system32\wbem\scrcons.exe
            C:\Windows\system32\wbem\scrcons.exe -Embedding
            1⤵
              PID:4488
              • C:\Windows\IME\systen.exe
                "C:\Windows\IME\systen.exe"
                2⤵
                  PID:2868
                • C:\Windows\IME\systen.exe
                  "C:\Windows\IME\systen.exe"
                  2⤵
                    PID:3184

                Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\11a.bat

                        Filesize

                        226B

                        MD5

                        c5b668ed624cf3fcd5e6b033b1afe672

                        SHA1

                        836df8c8b2bc10a26ef0fa8c1720447be9600ab7

                        SHA256

                        c10007d28ae7e188900a52b4b30a1e3392440dce1a5264c442a53b4ba35b581f

                        SHA512

                        274d894a64fc1ed3d3c82dccb5418e6e83ec94ad43a4ebd7101cf1dedcbf92366ff2714ab5123a2f1623cea137268377f9e3268fb4e757dfa9de61802494c671

                      • C:\Windows\IME\00.vbs

                        Filesize

                        57KB

                        MD5

                        12149987af581b174ffd2a6cdfe3381b

                        SHA1

                        0c5c2cb3014b1c730bf9fcc2338abbb1c0528ed1

                        SHA256

                        11009a1bd14dda33b937aa4904d739025d2d98c5f05e1235d9f531d4f6812ce9

                        SHA512

                        d3ffe1675b4fda94400c44caf73ed443ea88fca8cd96fefd10a1cb6f8e79f3b3654789a36b860620b3b33863c3245e9f15bd43e82087f242b1f02f4a1dc5999e

                      • C:\Windows\IME\rar.exe

                        Filesize

                        310KB

                        MD5

                        0a5680183c0089a64621e211917664d8

                        SHA1

                        8525d73c99e28413e97a094c99950e1806786246

                        SHA256

                        c7d6bfe9d26d1ecdd9f2e7f3f892a4d32030949937f86938edcb1995655c2814

                        SHA512

                        b843b8994c764c3761bef8d34eefb312c9d9567b3f4aadc38008caf42d0cdb82c33276203e4210adcc1e8c567268ebdf01a0a1e839694811932889ac971bb051

                      • C:\Windows\IME\systen.exe

                        Filesize

                        104KB

                        MD5

                        4d60faf0ab503e00d0470d21a018109d

                        SHA1

                        d4e47f6a1b8e6c40cac91f683c0d1dfa0161c364

                        SHA256

                        ec61669f8c6e1cccf1a2ee6dfca852a73b05c7f1ca9dd974e2af1525dbfc0d55

                        SHA512

                        ebfcaa50899be339a4bef98e60274c4ce338c835028bdbaa08ab481dfe2798b13fe9691dc4ad35b2b90ca31feeca2919dc6b89db9ec27294d958b999af4d6e64

                      • C:\Windows\IME\systen.exe

                        Filesize

                        669KB

                        MD5

                        3e5c5570bdd844ac8737629281158480

                        SHA1

                        25915fa51c4d3f2826c024a53195bc188158aca0

                        SHA256

                        a272adfd6d8c3a19937cb79216decd88dc88aa80b2cd29cbf1fdc0b52104beaa

                        SHA512

                        3ea8478f4a2a38eecd35216245e1eaa1c0f1e0dffb479cd82d4adefaee672c48a14a85fcdf3e3ba57414f85828cf6cb25f2540c61b85d501c2aeceb62af0a572

                      • C:\Windows\IME\systen.exe

                        Filesize

                        610KB

                        MD5

                        7cc94161e6eff8ff71fc4632a7f29402

                        SHA1

                        154a27333872761f2da366dd1c19f71c515d1167

                        SHA256

                        e2a82289fc05abb5ed9adafe07e5ccdf246e87dd670765d358e87c98702d0dc6

                        SHA512

                        d002b54f6df78d519847914a3cd9872ec6f8ed02eb8df5b169d41d3cd8a8e7fe2453cc2edb505ded791573cbbe9f386513e2be19787b8b830d763c32ce66004f

                      • C:\Windows\Web\lsoss.exe

                        Filesize

                        263KB

                        MD5

                        1a7e3aaa48236b6f5f708cc2ec581205

                        SHA1

                        c691ac732c4d6eef86890db83a1c514a3c9c9183

                        SHA256

                        4a4145eab5f0b6665b2e42dab1b2b20779e9d8d9bac2774c11cff0c69adf13f3

                        SHA512

                        d8bc86254db09ed73c9621d5267f28bbbb454df25e50c9602870a4d984bc37f74fc4b17b1f26605f1a9cf88f8334700c6164c64635bd13ea9ad50726cb8e9aa7

                      • C:\windows\ime\00.vbs

                        Filesize

                        391KB

                        MD5

                        8057f88dd672fa05e5e5dbeacdcd0737

                        SHA1

                        8492baf32833d00fa6ea8a412d3999342300b8e1

                        SHA256

                        70eee972629390ee0466efdb166ccc26e6a8d3946ca2b619aefcd363b9a608cf

                        SHA512

                        dceee583e8ff8aaf847dcb32f707ed1f0ddeafd1a94d036c0af7990f994e72d0ae9ea1a62ca9eafbe86679c54d2f1bc6ce88d12a326f98452769eeaac9af88e7

                      • C:\windows\ime\md5.txt

                        Filesize

                        806B

                        MD5

                        b871fe74597f5cb4116bc4075633c8b1

                        SHA1

                        6517e5738579d67dcb09bc0e25fab0f6b723d7e4

                        SHA256

                        48ce1c40121e71173d2d5908d2c6d76e66704679a2106e0b1d5ca7b32ad00b0a

                        SHA512

                        6900c7858c4a559cce7bf39648e7a671d3b8a96d46fd0a295aac8fd70d353ed4bc5d5da47620a140bc2cfd2e21d15b977059ce9a9712fcaba17367eb4d39a3b2

                      • C:\windows\ime\ok.rar

                        Filesize

                        266KB

                        MD5

                        0e613f2d4f256de6a97d4fb2dfddd2a6

                        SHA1

                        46a040447ba9887a99cdafeb636bee9d89341b09

                        SHA256

                        7beb29fefc719dd8c93484a44e92c7e765383cf8df9df9c29ca6fa745d53e074

                        SHA512

                        0c7e88e2142ef936fea918fc485122330842a1c743632b96feecfc04a5918ba76d311575e5defe25ba63bb2047311b3f53035fd76497523ec4339d051c6b2050

                      • \??\c:\windows\ime\00.txt

                        Filesize

                        142KB

                        MD5

                        a2dd00710d7cd43c8c47b45f34e8b44f

                        SHA1

                        48606ae8607995e286340a14b131bf0c34fd214d

                        SHA256

                        7f305c00470fb2a7c5692e13597dd6a29a92aee2adb3d7234b8e0042ed8cedc1

                        SHA512

                        b05ff16b94d74d7051a68d035131e22812ce6ae0ddaefb9f3aae8eea13858c7f86e7c0204b4b2fc5639bd766af425ed84f051cea04ccf9f95ddb23b2adca35a5

                      • \??\c:\windows\ime\125.bat

                        Filesize

                        1KB

                        MD5

                        035e07735205d1aac8c9553c957c1feb

                        SHA1

                        e9dc50bc762882a63a1d3a20642b6f32113a5b96

                        SHA256

                        b4eec69f711d4b18ea51a888a5aeb6698842a727f0ed2e749e0740e57094bdb5

                        SHA512

                        cf3abfd74dd3347970b233e6f44e77585699dd50abf10cebd0e4e17ff9be2f22fad8a29dc367b363e8f0577fba400ce3d4e2195f3f0a1f4e5653ec21fed72024

                      • \??\c:\windows\ime\ok1.bat

                        Filesize

                        360B

                        MD5

                        f38e24920e7c9520b8f5e37a6509a5be

                        SHA1

                        fb5bc29edad40738582917711458e146e417e125

                        SHA256

                        ef8e7af75bb2f474d9a7df2ebec6bbe7d22ebd848f95cc1f26a23a0f20fa1cdd

                        SHA512

                        5f57dac2f0125ef2d7feb480b57a93440344199972cdcf154799837c004eaf7abcdacc35fa258fd1515499539e0a4c023dac4875eec6dc4d2b7cda26bc068800

                      • \??\c:\windows\ime\systen.exe

                        Filesize

                        269KB

                        MD5

                        10c19212478e4e7558b8581020a60631

                        SHA1

                        5864c402941f87c8666cacb73154d932ac654684

                        SHA256

                        1e34f27d5d063e5a83210fa75c826370cc71cfc66b3833737ec75901112ef2cf

                        SHA512

                        8118151eb31b37315f697e05e16f129b4a1e6af93868c2bbf55c415ebda61cdd1d7a7925656d2ae4145786562c80a2c7aedb9158816438e0cfe46ee26fd7dc7b

                      • \??\c:\windows\ime\systen.txt

                        Filesize

                        2.4MB

                        MD5

                        7dcac5ed19ded29e3800920881c4868a

                        SHA1

                        49778397e3c9186884b016f77af09aca1118f50d

                        SHA256

                        1bbf2bca25ebd0f0d0d65566d37312d8197332c6b0b74da1bb245c8da2c5d39a

                        SHA512

                        67b330125c22ca8f98da3111652e518aa9bc6fbc1c5b5491f670d6c758b0842d00f21c33085c2c2301e29a35ca1b425ff9e228689f05b28877958f6b52d841a0

                      • \??\c:\windows\ime\usbhard.rar

                        Filesize

                        5KB

                        MD5

                        394fae3c2a908e0a9d7a5b1ff1fea0d1

                        SHA1

                        b9f3332acfa58b401f35fc3aa4aaee23fcdb91ae

                        SHA256

                        c61298d4c55156a95e61522a3f0bd0f381eec23455c73005f1e0133d01fe1d72

                        SHA512

                        308fb917051e8792741852e0d74a955ea0b3b7e75219c0a43e17cfef7e57a2d48dc5cf4ea76f7de404f0f5d0ece4bd7df267762a215bcc594f8c80f733f105fa

                      • \??\c:\windows\web\lsoss.exe

                        Filesize

                        358KB

                        MD5

                        0c3e631a8bacf7dba786085a62fd332c

                        SHA1

                        5f0cae565140a570eb230a04f0a3112666c503f4

                        SHA256

                        7899f52d1a62cb2137bd95c6c828c371bcc21143b21c1edef02503203b723d0d

                        SHA512

                        ebadd38c5d3e187277d4faaf84bf94e9bc44fb788e05c964df9be0867703576c3936e1a6a93f8ac6432419ca497bf802548b64705271ede9bca4ae1a3322143f

                      • \??\c:\windows\web\lsoss.txt

                        Filesize

                        354KB

                        MD5

                        177468e1b59e2b56264047795cddd88c

                        SHA1

                        d070fd60f1ffcececc6c2b6d3321e77f7ec00b72

                        SHA256

                        b59b82cb4d39181d9beb116407222cb9688650f6ef25bcbcff4e9ff3d92af17b

                        SHA512

                        c754dcaa500ae858504c70274b3037af78358d5dcf1c724055217e35ef90ccaa66ae213fb7f2f5e47eee86ac318a4f32969e8ecc696ba13fd4fcf4e8891401a9

                      • memory/980-49-0x0000000000400000-0x0000000000460000-memory.dmp

                        Filesize

                        384KB

                      • memory/3572-26-0x0000000000400000-0x00000000004A2000-memory.dmp

                        Filesize

                        648KB

                      • memory/3572-0-0x0000000000400000-0x00000000004A2000-memory.dmp

                        Filesize

                        648KB

                      • memory/3572-1-0x00000000001C0000-0x00000000001C3000-memory.dmp

                        Filesize

                        12KB

                      • memory/4956-20-0x0000000000400000-0x0000000000460000-memory.dmp

                        Filesize

                        384KB

                      • memory/5044-59-0x0000000002210000-0x0000000002211000-memory.dmp

                        Filesize

                        4KB

                      • memory/5044-57-0x0000000000400000-0x00000000004B7000-memory.dmp

                        Filesize

                        732KB

                      • memory/5044-58-0x0000000000620000-0x0000000000621000-memory.dmp

                        Filesize

                        4KB

                      • memory/5044-60-0x0000000000400000-0x00000000004B7000-memory.dmp

                        Filesize

                        732KB

                      • memory/5044-61-0x0000000000620000-0x0000000000621000-memory.dmp

                        Filesize

                        4KB

                      • memory/5044-63-0x0000000002210000-0x0000000002211000-memory.dmp

                        Filesize

                        4KB

                      • memory/5044-71-0x0000000000400000-0x00000000004B7000-memory.dmp

                        Filesize

                        732KB

                      • memory/5044-72-0x0000000000400000-0x00000000004B7000-memory.dmp

                        Filesize

                        732KB