Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 05:23

General

  • Target

    767f07294d51123d79c4a3d10f850278.exe

  • Size

    564KB

  • MD5

    767f07294d51123d79c4a3d10f850278

  • SHA1

    810cee42f525a0bc48387f29b18fb91d48697aa5

  • SHA256

    74f0bf7e738527bb84df1bf3a1603cfb6f09c27e3c75dbd70462f137112df9cd

  • SHA512

    9a886569238bdac1e87189d2348d5b5326bc7b9f91110aab13a441c971e0e340d318b49eb1a173a7cec27ca5a0f774c578f7406b82c897bd1fa2a3294b087512

  • SSDEEP

    6144:fC5Rydo1Li9eSlcFELaa7TQwtutvrNGbFzppkSessTgFo8oh:f8yy5i9eS3LRHuhNGbFzppkSessTgFo

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\767f07294d51123d79c4a3d10f850278.exe
    "C:\Users\Admin\AppData\Local\Temp\767f07294d51123d79c4a3d10f850278.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\spoolsv.exe" CityScape Enable
      2⤵
      • Modifies Windows Firewall
      PID:532
    • C:\Users\Admin\AppData\Roaming\spoolsv.exe
      /d C:\Users\Admin\AppData\Local\Temp\767f07294d51123d79c4a3d10f850278.exe
      2⤵
      • Modifies WinLogon for persistence
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:2296
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 776
      2⤵
      • Program crash
      PID:4080
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2404 -ip 2404
    1⤵
      PID:1960

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\eJbhWlWU

      Filesize

      51KB

      MD5

      cb2b4610e66cf1cd2598b1d8bc443f03

      SHA1

      315563d817162ff1250d00867c26f6bb088935cc

      SHA256

      801179eec895373c621fb4c024c6e4ef6b309db881f2b279692579082499c1eb

      SHA512

      f264929fff786c05eb13517939eb55a4755da19b475b7855ca7e2edb6850c84543122260456cd60006ef42cd66c22b3930d9714e9acc1ea49422e788042f0baf

    • C:\Users\Admin\AppData\Roaming\spoolsv.exe

      Filesize

      564KB

      MD5

      f871f257a7b262304a673d81328839cb

      SHA1

      1578a2cabd8f46f8e37afff227f9fc04aad948ab

      SHA256

      be3ff01baec08e5e31ef3d1c80f202d2fd4539409afa235afc743ada7776c52e

      SHA512

      e38259bf5efafefc8b4966746a07cdea1c904c8c0e6bc434f4b6dd01fbaf48e9f5647177fb3c80f2bd648dfaaa7e05c8acb63d77bb1e0ba7d0d2b7886b9779b2

    • memory/2296-24-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/2296-25-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/2296-27-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/2296-30-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/2296-33-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/2296-36-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/2404-0-0x00000000022E0000-0x000000000236F000-memory.dmp

      Filesize

      572KB

    • memory/2404-1-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB

    • memory/2404-21-0x0000000000400000-0x000000000048F000-memory.dmp

      Filesize

      572KB