Analysis

  • max time kernel
    158s
  • max time network
    176s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/01/2024, 12:40

General

  • Target

    ab69cf121b15e5b56f4d43675e172aef6edba6587583a287297c96e5a2eef82f.exe

  • Size

    1.8MB

  • MD5

    90734720bd1cb91d78a70f31d4a9ef33

  • SHA1

    0c6eb9c230106dcdb3e7f4f38ed5124a7756e29a

  • SHA256

    ab69cf121b15e5b56f4d43675e172aef6edba6587583a287297c96e5a2eef82f

  • SHA512

    45dfd1c9fd754c5287a2e98e38153b41f7f03dfb8bac9ab65e2b336203c7fda157c229e98dae260d5585dd8583d45fb0033becaf50dbfe57748867e9c1cb7a02

  • SSDEEP

    49152:yx5SUW/cxUitIGLsF0nb+tJVYleAMz77+WAqaB0zj0yjoB2:yvbjVkjjCAzJsB2Yyjl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 15 IoCs
  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab69cf121b15e5b56f4d43675e172aef6edba6587583a287297c96e5a2eef82f.exe
    "C:\Users\Admin\AppData\Local\Temp\ab69cf121b15e5b56f4d43675e172aef6edba6587583a287297c96e5a2eef82f.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2208
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:2680
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
    1⤵
    • Executes dropped EXE
    PID:836
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2596
  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 178 -InterruptEvent 164 -NGENProcess 168 -Pipe 174 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2588
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 13c -InterruptEvent 180 -NGENProcess 1e8 -Pipe 170 -Comment "NGen Worker Process"
      2⤵
      • Executes dropped EXE
      PID:2612
  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:1684
  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    PID:2520
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:308

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE

    Filesize

    2.9MB

    MD5

    06154a194d9ec55fdcad1b7be1e8fbe2

    SHA1

    89549efd205581ff364656ce9ebf15c91b025d24

    SHA256

    ab76a4391f222de13f4affbe2bb5d80d6c6cc429a081ab45b9b96a80cf213d51

    SHA512

    b6eb3b52cc5873aed2b5906df159c2facc834a5815072d72bb95e639e439505b89e375d21ab555d18aa67b0a3f8ebf11ff3172ded90f36cde8ceaaa7f7553198

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    1.6MB

    MD5

    87e78704b47462d75ed3bc32978a3f70

    SHA1

    f0084cdf5fae5359e3ac631ed9ecaed318f39d9f

    SHA256

    a8a13954b7ff146d4d30f132e51904852ad432bb91ca76adf87455a647369f3e

    SHA512

    0f20a1ecb5a41cf6bb43671c735adfc49e5f4698bd98eb07a0fb85502a13b6715c071df2094c6c2f17895883e33b38d48c3b79c9cbdfd2a3dcd73b13dca59095

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

    Filesize

    857KB

    MD5

    d80992578587e1abc9ed843fe4277317

    SHA1

    be7b021b0fc7df4f03769610198e9046f96847eb

    SHA256

    87bb1a8f389edbc65e1188fda317b3b0e3bd8265cf86d9fcf4f6d021b4fbb6d5

    SHA512

    634d383b2cd929b56bb40f3cf0d3d352a10db45f92dd308009c5ebadea708236c314618905ab94c51d64d6eae42ec686747c2855650ae959af98197db89561a7

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    1.5MB

    MD5

    c13170382ced19405285a6c07dff598e

    SHA1

    8936c26405dbb9e3ce4c7ff05c2e98c7e91537eb

    SHA256

    9f2ccd4830fb9fbb009e4e1124c9f32abab2c8c70a2dbf67b51c2074ed9b660f

    SHA512

    2de67b7c9fd262324fd3aea81474741ec7e4c3a3bf55b52e618399e6df93480f5e0391b489e9338afcb021bb5441d2e36f2b3f68743d72600b598163e90725fb

  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe

    Filesize

    394KB

    MD5

    5766b69ddb7a55afe27be86361e8f680

    SHA1

    f379067d22e864f4bbbe3a75fd6944fe5c554b7e

    SHA256

    ffe36eed1885cb6ace7d03662cdbfaa311678b32444fabb90888b153fe8b938f

    SHA512

    1b5398713828fa170e0091f8788fc701173ad51af34908a8511df8d85256db4d12ba9d681202ae31b68a370f8c63779eb365d3ffafbe7ffe6b220807f498cadc

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    1.5MB

    MD5

    1f7398bc57140b7be4fd4ef17a75c133

    SHA1

    29b1fefd07feee01753bf10cc72b302bc30ea2bc

    SHA256

    fa4ab9d6fd73339ff23950ca7861173a343d7cb53847c5fea1cb1b5b3140b610

    SHA512

    1ab1e546d44bb477f5df6b73cb612ef3e14143845188f0a6814a16749a6323d57d1fadb9bbf9bb05ce2999dd8b5a90b6612b17a702685c82c73ee001380d8bb3

  • C:\Windows\System32\alg.exe

    Filesize

    1.3MB

    MD5

    83ec3e87647fc083924673a5d450738a

    SHA1

    8a6e86b1df1486ba79c4c34d1aeb0032c648cd83

    SHA256

    b590f354faf1b8d3e15f1ed6ab9e0fbdfabf540210e57f7bfbf03083696b25c1

    SHA512

    9b2776e81ea6507e037d372977c9cbac57a432aa65542a79a942f328f6a97ba6b1e3a86f14bcd3551b1de51bd9845ee53739fbcc1ce7b8ff43d1c3c11f7ba699

  • \Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe

    Filesize

    1.5MB

    MD5

    92fffc2f37bcfa19374f07067f55879f

    SHA1

    33a1d4c91487a9efb2f4f3786f396a385923c9c2

    SHA256

    58795910794cda52ac252be9f97cc448183eafb251d67afc5d30aed0c9a111f5

    SHA512

    445cbfd4e93d1dd1a596f4142e4e090c21004f26015d60ef3b232a06a6dc742e1e3c6e2d7e098b71731047a76fec58dc8c426cd75991ec516ac018ba3d51b259

  • \Windows\System32\alg.exe

    Filesize

    1.2MB

    MD5

    b8ae3118834dfef3a1b860dd08c9c503

    SHA1

    7378ea50c6e80aa35748ad064bf21a6a977aea84

    SHA256

    c9b6928753ef69b77a0dd86b974f8b03ee2d9f5513ba9cf0250f606c8fe94f4d

    SHA512

    716594d443cca43e1bc13ea46734a0d743163b93f926df1e65ecdb04777c586b7a484432521024d704bc04cc978b2068b1af6d5bd1f9a81f9dd9c095f502614a

  • memory/308-264-0x0000000140000000-0x00000001401AA000-memory.dmp

    Filesize

    1.7MB

  • memory/308-252-0x0000000000FA0000-0x0000000001000000-memory.dmp

    Filesize

    384KB

  • memory/308-265-0x0000000000FA0000-0x0000000001000000-memory.dmp

    Filesize

    384KB

  • memory/308-266-0x0000000140000000-0x00000001401AA000-memory.dmp

    Filesize

    1.7MB

  • memory/836-170-0x0000000140000000-0x000000014017D000-memory.dmp

    Filesize

    1.5MB

  • memory/836-192-0x0000000140000000-0x000000014017D000-memory.dmp

    Filesize

    1.5MB

  • memory/1684-209-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/1684-205-0x00000000008C0000-0x0000000000920000-memory.dmp

    Filesize

    384KB

  • memory/1684-199-0x00000000008C0000-0x0000000000920000-memory.dmp

    Filesize

    384KB

  • memory/1684-196-0x0000000140000000-0x0000000140237000-memory.dmp

    Filesize

    2.2MB

  • memory/1796-194-0x0000000140000000-0x000000014018E000-memory.dmp

    Filesize

    1.6MB

  • memory/1796-185-0x0000000140000000-0x000000014018E000-memory.dmp

    Filesize

    1.6MB

  • memory/2208-1-0x0000000000400000-0x00000000005D4000-memory.dmp

    Filesize

    1.8MB

  • memory/2208-166-0x0000000000400000-0x00000000005D4000-memory.dmp

    Filesize

    1.8MB

  • memory/2208-0-0x00000000005E0000-0x0000000000647000-memory.dmp

    Filesize

    412KB

  • memory/2208-84-0x0000000000400000-0x00000000005D4000-memory.dmp

    Filesize

    1.8MB

  • memory/2208-6-0x00000000005E0000-0x0000000000647000-memory.dmp

    Filesize

    412KB

  • memory/2520-267-0x000000002E000000-0x000000002FE1E000-memory.dmp

    Filesize

    30.1MB

  • memory/2520-243-0x000000002E000000-0x000000002FE1E000-memory.dmp

    Filesize

    30.1MB

  • memory/2520-241-0x0000000000410000-0x0000000000477000-memory.dmp

    Filesize

    412KB

  • memory/2520-236-0x0000000000410000-0x0000000000477000-memory.dmp

    Filesize

    412KB

  • memory/2588-231-0x0000000140000000-0x000000014018E000-memory.dmp

    Filesize

    1.6MB

  • memory/2588-210-0x0000000140000000-0x000000014018E000-memory.dmp

    Filesize

    1.6MB

  • memory/2588-232-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

    Filesize

    9.9MB

  • memory/2588-221-0x0000000000AE0000-0x0000000000B40000-memory.dmp

    Filesize

    384KB

  • memory/2588-218-0x0000000000AE0000-0x0000000000B40000-memory.dmp

    Filesize

    384KB

  • memory/2588-211-0x0000000000AE0000-0x0000000000B40000-memory.dmp

    Filesize

    384KB

  • memory/2588-253-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

    Filesize

    9.9MB

  • memory/2596-173-0x00000000006C0000-0x0000000000727000-memory.dmp

    Filesize

    412KB

  • memory/2596-172-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

  • memory/2596-178-0x00000000006C0000-0x0000000000727000-memory.dmp

    Filesize

    412KB

  • memory/2596-193-0x0000000000400000-0x0000000000588000-memory.dmp

    Filesize

    1.5MB

  • memory/2612-233-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

    Filesize

    9.9MB

  • memory/2612-247-0x00000000005F0000-0x0000000000650000-memory.dmp

    Filesize

    384KB

  • memory/2612-249-0x0000000140000000-0x000000014018E000-memory.dmp

    Filesize

    1.6MB

  • memory/2612-248-0x000007FEF5B70000-0x000007FEF655C000-memory.dmp

    Filesize

    9.9MB

  • memory/2612-234-0x0000000140000000-0x000000014018E000-memory.dmp

    Filesize

    1.6MB

  • memory/2612-229-0x00000000005F0000-0x0000000000650000-memory.dmp

    Filesize

    384KB

  • memory/2612-222-0x00000000005F0000-0x0000000000650000-memory.dmp

    Filesize

    384KB

  • memory/2680-73-0x0000000000790000-0x00000000007F0000-memory.dmp

    Filesize

    384KB

  • memory/2680-64-0x0000000000790000-0x00000000007F0000-memory.dmp

    Filesize

    384KB

  • memory/2680-93-0x0000000100000000-0x0000000100184000-memory.dmp

    Filesize

    1.5MB

  • memory/2680-65-0x0000000100000000-0x0000000100184000-memory.dmp

    Filesize

    1.5MB