Analysis

  • max time kernel
    138s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2024, 03:21

General

  • Target

    7c03024c4c468bd80483191cfde3d06d.exe

  • Size

    752KB

  • MD5

    7c03024c4c468bd80483191cfde3d06d

  • SHA1

    0e6a8b93894ff063a5e4f3fee7dc46a4971c204a

  • SHA256

    136640bef8b8dff5c569b1de1de8999a75b3d3be7b8b46f356586c9cb9ebd476

  • SHA512

    553293be7e2638e177c94b89438f865c14adc0ec1abfb6b393c27f02f7f4866fc0286f442d0c288b9e5cc135343072405741a53b07c82e06392c57fd420cec4c

  • SSDEEP

    12288:u8wmjn6RuovA4Tc665eZe2zAdNbI3YE02sR8Peaq0FS94L9qDtaxD5kCPrfc8vyi:u8wa6QovmeZ4dWoT5Kvq0FSSoaxSCw8J

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c03024c4c468bd80483191cfde3d06d.exe
    "C:\Users\Admin\AppData\Local\Temp\7c03024c4c468bd80483191cfde3d06d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Users\Admin\AppData\Local\Temp\bedgjeabca.exe
      C:\Users\Admin\AppData\Local\Temp\bedgjeabca.exe 3,9,5,6,7,7,3,1,4,2,2 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3112
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81706412115.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2516
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81706412115.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4604
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81706412115.txt bios get version
        3⤵
          PID:1364
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81706412115.txt bios get version
          3⤵
            PID:5000
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81706412115.txt bios get version
            3⤵
              PID:1656
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 964
              3⤵
              • Program crash
              PID:2948
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3112 -ip 3112
          1⤵
            PID:4112

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\81706412115.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81706412115.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\81706412115.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\bedgjeabca.exe

            Filesize

            1.2MB

            MD5

            8b3d7a03b4c033adb0eaa9b9ca3822b1

            SHA1

            e32434c14db62b47b2b3d4c10102827205c5a4fe

            SHA256

            dfd46a28e0433c0d173300961f79d8b9f1f71896b703ffa55fc76b94c4366d69

            SHA512

            01e351044277eaadd48a04ed971bdb14b2b80cc1c6e80d0b9ed956d9f94dd41a2f65a1369891e52b4f907d2f49ae0dfb3bf212181d1e592c188479649b8ed589

          • C:\Users\Admin\AppData\Local\Temp\nsjD070.tmp\ZipDLL.dll

            Filesize

            163KB

            MD5

            2dc35ddcabcb2b24919b9afae4ec3091

            SHA1

            9eeed33c3abc656353a7ebd1c66af38cccadd939

            SHA256

            6bbeb39747f1526752980d4dbec2fe2c7347f3cc983a79c92561b92fe472e7a1

            SHA512

            0ccac336924f684da1f73db2dd230a0c932c5b4115ae1fa0e708b9db5e39d2a07dc54dac8d95881a42069cbb2c2886e880cdad715deda83c0de38757a0f6a901

          • C:\Users\Admin\AppData\Local\Temp\nsjD070.tmp\mnwtvkk.dll

            Filesize

            158KB

            MD5

            9e9b57722d577d1cf7f6055a87fb9932

            SHA1

            35e51b382ab68d153d54231a8f6557d95498e010

            SHA256

            35fe1183753af5cf933cd88f13f5451ca031c616d7d3e680b6f0456c6f11be6e

            SHA512

            f7ab30588b5057f43c4db8e043a30e4acbbabfdf36f7eebfd34ba2ec68c5521c723d3246383120564569ce4f823d17dd1a17aa371d75df97b00d04e900fe495d