Analysis

  • max time kernel
    134s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/01/2024, 10:05

General

  • Target

    651d91d3ebde3977b10ebadfe0269d4d.exe

  • Size

    9.2MB

  • MD5

    651d91d3ebde3977b10ebadfe0269d4d

  • SHA1

    2b8cf23d30ad284da26bad86ffaa9ed2b246b512

  • SHA256

    36ea9c07252aa739c8a8366453f629a5762afc152b32fa358c893ca0233791a6

  • SHA512

    3930c42654d9a9e84b8aa6a500b425beb98df2282415f2654556bdee36ec8821bd7df428d9522c8a695ca9dc2f9a8fd6dd579e05c8f5c21d583b0c4c4276adf6

  • SSDEEP

    196608:R01dh08Tgk7c/ihukxA3f97Y1zO2sPnGMfhReCWJo8i1zwh/:R2dDTfc/YXq3fxY1ranGMbso/NwV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\651d91d3ebde3977b10ebadfe0269d4d.exe
    "C:\Users\Admin\AppData\Local\Temp\651d91d3ebde3977b10ebadfe0269d4d.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    PID:4164
    • C:\Users\Admin\AppData\Local\Temp\k344cwau.vc5\651d91d3ebde3977b10ebadfe0269d4d.exe
      "C:\Users\Admin\AppData\Local\Temp\k344cwau.vc5\651d91d3ebde3977b10ebadfe0269d4d.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 1708
        3⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:728

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\651d91d3ebde3977b10ebadfe0269d4d.exe.log

          Filesize

          312B

          MD5

          d4b49ac61a6cac139f96450777c10204

          SHA1

          92089d33442c9e2eaceac3ed8db6a7168f938e5a

          SHA256

          807bdfa62a4312030c1ed54981674cff77f6108e6b4957754cabb810098ce082

          SHA512

          eb13a0e7f0d4b44db7e8d0625ba1ee6a036083c39c24b85493d3ec9074ada03eb7003b97bd92ed5f2baaf26295a4690303332593c4776e75da5bc3b6adbc3ea6

        • C:\Users\Admin\AppData\Local\Temp\k344cwau.vc5\651d91d3ebde3977b10ebadfe0269d4d.exe

          Filesize

          48KB

          MD5

          79e302e289777f106d299b6138115651

          SHA1

          1cd985cab550b6be5835bccb422c520568ef36df

          SHA256

          46320e5c12a81ec504f53c85daec5bc7ddd45c1624b38742c2ceb13e09da5e03

          SHA512

          2b90a14ed3340fb3ac7b098e1cf90be26afc9efdc6c7bc096f9ad6440b7a5171e1de84b78624e9828164fcc4223f165bca2b07accd5958b8d5ce91c774474e98

        • C:\Users\Admin\AppData\Local\Temp\k344cwau.vc5\651d91d3ebde3977b10ebadfe0269d4d.exe

          Filesize

          67KB

          MD5

          933c630ef7dba72114b9ec2214db388b

          SHA1

          40cb9ed3abe9a3e5ee60977c9d50c6401dde365b

          SHA256

          23e7fb2a5b16b630d8e87040e756c690cde7b61ea50e499b0ada928562c1348b

          SHA512

          76fda58bf04c4eec78638ab3d44553e4120f61cdd6aa0da6c3b7c5633c6140a9fc759f0dbcb03983c0814431f918792ba1082c06d46053bb0cf5896c1f393351

        • C:\Users\Admin\AppData\Local\Temp\k344cwau.vc5\651d91d3ebde3977b10ebadfe0269d4d.exe

          Filesize

          455KB

          MD5

          eccb1f8bcae20d373b4ea2a58b9482ac

          SHA1

          f5c5918e7b042812e667455efb4444608a2d64dd

          SHA256

          9cb31d8b03409a37e77bf1b7ddd7a3958ca9f4921660b60568da8fa37a34dfab

          SHA512

          a877521252884cff421d436695d3314b9a44eee685610fa5ac5c3ff5bbc260e3e4db8ca8a4d82cc953f114a2a8ca0445216a9938d6f742a48e971bf89f839016

        • memory/1112-68-0x0000000072E10000-0x0000000072EF3000-memory.dmp

          Filesize

          908KB

        • memory/1112-49-0x0000000076E00000-0x0000000076F20000-memory.dmp

          Filesize

          1.1MB

        • memory/1112-21-0x00000000027C0000-0x00000000027C1000-memory.dmp

          Filesize

          4KB

        • memory/1112-24-0x0000000074E10000-0x00000000753C1000-memory.dmp

          Filesize

          5.7MB

        • memory/1112-23-0x0000000076570000-0x0000000076785000-memory.dmp

          Filesize

          2.1MB

        • memory/1112-27-0x0000000074E10000-0x00000000753C1000-memory.dmp

          Filesize

          5.7MB

        • memory/1112-31-0x0000000074E10000-0x00000000753C1000-memory.dmp

          Filesize

          5.7MB

        • memory/1112-32-0x0000000073B30000-0x0000000073B8B000-memory.dmp

          Filesize

          364KB

        • memory/1112-30-0x00000000755E0000-0x00000000756C3000-memory.dmp

          Filesize

          908KB

        • memory/1112-28-0x0000000002EF0000-0x0000000002F00000-memory.dmp

          Filesize

          64KB

        • memory/1112-29-0x00000000761E0000-0x0000000076461000-memory.dmp

          Filesize

          2.5MB

        • memory/1112-26-0x0000000075C20000-0x00000000761D3000-memory.dmp

          Filesize

          5.7MB

        • memory/1112-17-0x0000000000B00000-0x0000000000BF0000-memory.dmp

          Filesize

          960KB

        • memory/1112-80-0x00000000027F0000-0x000000000282D000-memory.dmp

          Filesize

          244KB

        • memory/1112-81-0x0000000000B00000-0x0000000000BF0000-memory.dmp

          Filesize

          960KB

        • memory/1112-95-0x0000000074E10000-0x00000000753C1000-memory.dmp

          Filesize

          5.7MB

        • memory/1112-39-0x0000000072F00000-0x0000000072F8D000-memory.dmp

          Filesize

          564KB

        • memory/1112-46-0x0000000076570000-0x0000000076785000-memory.dmp

          Filesize

          2.1MB

        • memory/1112-53-0x0000000075C20000-0x00000000761D3000-memory.dmp

          Filesize

          5.7MB

        • memory/1112-60-0x00000000761E0000-0x0000000076461000-memory.dmp

          Filesize

          2.5MB

        • memory/1112-72-0x00000000772C0000-0x00000000772C6000-memory.dmp

          Filesize

          24KB

        • memory/1112-64-0x0000000073310000-0x0000000073316000-memory.dmp

          Filesize

          24KB

        • memory/1112-70-0x0000000072C90000-0x0000000072D58000-memory.dmp

          Filesize

          800KB

        • memory/1112-69-0x0000000072DE0000-0x0000000072E0B000-memory.dmp

          Filesize

          172KB

        • memory/1112-19-0x00000000027F0000-0x000000000282D000-memory.dmp

          Filesize

          244KB

        • memory/1112-67-0x0000000072F00000-0x0000000072F8D000-memory.dmp

          Filesize

          564KB

        • memory/1112-22-0x00000000027F0000-0x000000000282D000-memory.dmp

          Filesize

          244KB

        • memory/1112-99-0x0000000073B30000-0x0000000073B8B000-memory.dmp

          Filesize

          364KB

        • memory/1112-71-0x0000000072C20000-0x0000000072C52000-memory.dmp

          Filesize

          200KB

        • memory/1112-63-0x0000000073B30000-0x0000000073B8B000-memory.dmp

          Filesize

          364KB

        • memory/1112-62-0x0000000073B90000-0x0000000073C04000-memory.dmp

          Filesize

          464KB

        • memory/1112-59-0x0000000074E10000-0x00000000753C1000-memory.dmp

          Filesize

          5.7MB

        • memory/1112-58-0x00000000753D0000-0x00000000753D8000-memory.dmp

          Filesize

          32KB

        • memory/1112-57-0x00000000753E0000-0x00000000753EF000-memory.dmp

          Filesize

          60KB

        • memory/1112-56-0x0000000077580000-0x00000000775C5000-memory.dmp

          Filesize

          276KB

        • memory/1112-55-0x00000000753F0000-0x000000007547D000-memory.dmp

          Filesize

          564KB

        • memory/1112-54-0x0000000075520000-0x0000000075572000-memory.dmp

          Filesize

          328KB

        • memory/1112-52-0x00000000774C0000-0x000000007757F000-memory.dmp

          Filesize

          764KB

        • memory/1112-51-0x0000000076A60000-0x0000000076AD5000-memory.dmp

          Filesize

          468KB

        • memory/1112-50-0x00000000764B0000-0x000000007656F000-memory.dmp

          Filesize

          764KB

        • memory/1112-66-0x00000000767C0000-0x00000000768BA000-memory.dmp

          Filesize

          1000KB

        • memory/1112-48-0x0000000077630000-0x00000000776AB000-memory.dmp

          Filesize

          492KB

        • memory/1112-47-0x0000000076950000-0x0000000076974000-memory.dmp

          Filesize

          144KB

        • memory/1112-73-0x0000000002EF0000-0x0000000002F00000-memory.dmp

          Filesize

          64KB

        • memory/1112-45-0x0000000000B00000-0x0000000000BF0000-memory.dmp

          Filesize

          960KB

        • memory/1112-83-0x0000000076950000-0x0000000076974000-memory.dmp

          Filesize

          144KB

        • memory/1112-82-0x0000000076570000-0x0000000076785000-memory.dmp

          Filesize

          2.1MB

        • memory/1112-65-0x00000000772D0000-0x0000000077333000-memory.dmp

          Filesize

          396KB

        • memory/1112-97-0x00000000755E0000-0x00000000756C3000-memory.dmp

          Filesize

          908KB

        • memory/4164-2-0x0000000001260000-0x0000000001270000-memory.dmp

          Filesize

          64KB

        • memory/4164-1-0x0000000074E10000-0x00000000753C1000-memory.dmp

          Filesize

          5.7MB

        • memory/4164-0-0x0000000074E10000-0x00000000753C1000-memory.dmp

          Filesize

          5.7MB

        • memory/4164-20-0x0000000074E10000-0x00000000753C1000-memory.dmp

          Filesize

          5.7MB