Analysis

  • max time kernel
    74s
  • max time network
    78s
  • platform
    windows10-1703_x64
  • resource
    win10-20231215-en
  • resource tags

    arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/01/2024, 15:09

General

  • Target

    Test.exe

  • Size

    12KB

  • MD5

    0a58407437f5955d762b9f9bba885f18

  • SHA1

    6a0ac30d93dd9d13f44d29ae33f95a6baeab6b63

  • SHA256

    3786c12f920288cdd4f634b7f036976e861a3724649337a1dcf0b01585592031

  • SHA512

    0ee55f87fde502a510a572537cb77a0c4496c77f08f55a161cee802404b2b0b914c05c39d26090308d7bc8a41b050902654200cc5e08263ba8320dfa260ab4c0

  • SSDEEP

    192:KLsn92aYjyXxqE0ADSnjWVPkx9e8nuezE8J7N4W:Gsn92aMulk+2e8uezEK

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Test.exe
    "C:\Users\Admin\AppData\Local\Temp\Test.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Windows\SysWOW64\reg.exe
      "C:\Windows\system32\reg.exe" add "HKCU\Software\Classes\ms-settings\shell\open\command" /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\turkeyjack466590.vbs" /f
      2⤵
        PID:1892
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\system32\reg.exe" add "HKCU\Software\Classes\ms-settings\shell\open\command" /v DelegateExecute /d "0" /f
        2⤵
          PID:4468
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C computerdefaults.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2036
          • C:\Windows\SysWOW64\ComputerDefaults.exe
            computerdefaults.exe
            3⤵
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:4132
            • C:\Windows\SysWOW64\unregmp2.exe
              C:\Windows\system32\unregmp2.exe /SetWMPAsDefault
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:760
              • C:\Windows\System32\unregmp2.exe
                "C:\Windows\SysNative\unregmp2.exe" /SetWMPAsDefault /REENTRANT
                5⤵
                • Drops file in Windows directory
                • Modifies registry class
                PID:4440
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C schtasks /Create /SC ONLOGON /TN MicrosoftEdgeUpdateTaskUXM_ixlBZeBTmMfddplUer3K040MX /TR "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\ixlBZeBTmMfddplUer3K040MX.exe" /RL HIGHEST /IT
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1088
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /Create /SC ONLOGON /TN MicrosoftEdgeUpdateTaskUXM_ixlBZeBTmMfddplUer3K040MX /TR "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\ixlBZeBTmMfddplUer3K040MX.exe" /RL HIGHEST /IT
            3⤵
            • Creates scheduled task(s)
            PID:1504

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/208-1-0x00000000733D0000-0x0000000073ABE000-memory.dmp

              Filesize

              6.9MB

            • memory/208-0-0x00000000011D0000-0x00000000011DC000-memory.dmp

              Filesize

              48KB

            • memory/208-2-0x00000000010A0000-0x00000000010BA000-memory.dmp

              Filesize

              104KB

            • memory/208-3-0x00000000003B0000-0x00000000003BA000-memory.dmp

              Filesize

              40KB

            • memory/208-4-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

              Filesize

              64KB

            • memory/208-5-0x0000000004D70000-0x0000000004E02000-memory.dmp

              Filesize

              584KB

            • memory/208-6-0x0000000005310000-0x000000000580E000-memory.dmp

              Filesize

              5.0MB

            • memory/208-13-0x00000000733D0000-0x0000000073ABE000-memory.dmp

              Filesize

              6.9MB

            • memory/208-14-0x000000000D760000-0x000000000E80C000-memory.dmp

              Filesize

              16.7MB