Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    28/01/2024, 10:33

General

  • Target

    7ce4908ce1c9be6187fc3d7d8cc03d46.exe

  • Size

    24KB

  • MD5

    7ce4908ce1c9be6187fc3d7d8cc03d46

  • SHA1

    e773201f1cae6ed47bb1a109bb6ba6322e61a002

  • SHA256

    57d415c667f77bb32fb73b232cde13c58d1b060a1a5f4834bdc1c144b4290189

  • SHA512

    1276eb449b4b4e52540fc8ff306088329dea311746267eb06832d79074c5afc117ceb09474a5cd7c2bd1c0219e5f3721a59132d6e08a845041309d2fc1625b92

  • SSDEEP

    384:E3eVES+/xwGkRKJilM61qmTTMVF9/q5k0:bGS+ZfbJiO8qYoAF

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ce4908ce1c9be6187fc3d7d8cc03d46.exe
    "C:\Users\Admin\AppData\Local\Temp\7ce4908ce1c9be6187fc3d7d8cc03d46.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c set
        3⤵
          PID:2728
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /all
          3⤵
          • Gathers network information
          PID:1108
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2864
        • C:\Windows\SysWOW64\net.exe
          net start
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2872
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start
            4⤵
              PID:2748
          • C:\Windows\SysWOW64\NETSTAT.EXE
            netstat -an
            3⤵
            • Gathers network information
            • Suspicious use of AdjustPrivilegeToken
            PID:2752

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • \??\c:\windows\temp\flash.log

              Filesize

              8KB

              MD5

              1ba6611779fe10091247e98190ff45b0

              SHA1

              00da1919a53e404e62dad4ed004f079cab803c0f

              SHA256

              19b93a78c10b7163b76a073dc5f63d32d8e53d800d14115ee31b65ee24d10fb1

              SHA512

              ade972f00d5e26131905d8d36b6a8f18a23f48bc15e538e103ee2431b1116244bb9e7316f7813902f3c1bd513ecb96b6d39c20a572aa522fec87ca49402ac0b2