Analysis

  • max time kernel
    85s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2024, 07:37

General

  • Target

    64d6a15843305a0c2df1f159e84afa41.exe

  • Size

    156KB

  • MD5

    64d6a15843305a0c2df1f159e84afa41

  • SHA1

    2475051a8179ebd0b4829e00cd0194b54e4b39f5

  • SHA256

    5ca36a4253289490bc69e3d0c4819514bb6fa6ba1d4405127c37e81b37d3b09f

  • SHA512

    18c4cfe30fecedecad8ec3d9e10607461aa2a6bf635458f59229ab98450389694f826cef0a7f15ae18ac8ccb67d83d087a6a81bff45e9df93289287737e61839

  • SSDEEP

    3072:PMngP1zP4IbrGpnqIE2Vc4cffB8Pzn0sZTz5btNE:kEXGpLcvnMDJTzJE

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Unexpected DNS network traffic destination 9 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:468
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1276
    • C:\Users\Admin\AppData\Local\Temp\64d6a15843305a0c2df1f159e84afa41.exe
      "C:\Users\Admin\AppData\Local\Temp\64d6a15843305a0c2df1f159e84afa41.exe"
      2⤵
      • Registers COM server for autorun
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Deletes itself
        PID:3044

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\{19350fc2-aa90-f613-4bf0-85f7eee99382}\n

          Filesize

          26KB

          MD5

          fab7de9eafea67f88e43003698024c86

          SHA1

          24a4ef27c29cdeabed5e0af867e3f568da40d0c9

          SHA256

          073b1f99871dc56a33dcd55af71d53482816bfc9b3ce5c78ee53bed31b428384

          SHA512

          b4a57a8cc564760526d4cce26ce24e80657c064df373c307bb90cf053d01d04bdfe1def41fedfeb7715e53d8481a98c94bc6f3bf33815b4571d898aa08553fcd

        • \systemroot\Installer\{19350fc2-aa90-f613-4bf0-85f7eee99382}\@

          Filesize

          2KB

          MD5

          9151aaccfd7bfdce8748ca1e18296cc6

          SHA1

          cf8ec8529c6a783fb1efa138bc38d30960e21e2f

          SHA256

          81d912fc49d8958a2de681065b2136a402428a267df729964f16cad5b35d1e62

          SHA512

          e956bf0fef0f1cdc3c4cc93a3c76a13b621244c4b60704c58ab317ebfa9164c3f2fe186f40d442e4ec75619e02a1653d0e88c017f655c59e16f73126f19d763a

        • memory/468-20-0x0000000002A50000-0x0000000002A51000-memory.dmp

          Filesize

          4KB

        • memory/468-13-0x0000000002A50000-0x0000000002A51000-memory.dmp

          Filesize

          4KB

        • memory/1188-17-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1188-15-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1188-16-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1188-1-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1188-19-0x0000000000400000-0x0000000000433000-memory.dmp

          Filesize

          204KB

        • memory/1188-2-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1276-7-0x0000000002A50000-0x0000000002A51000-memory.dmp

          Filesize

          4KB

        • memory/1276-3-0x00000000004C0000-0x00000000005C0000-memory.dmp

          Filesize

          1024KB

        • memory/1276-18-0x0000000002A50000-0x0000000002A51000-memory.dmp

          Filesize

          4KB