Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2024, 03:44

General

  • Target

    85d7261abe81a306c834e86e5985c4b4.exe

  • Size

    20KB

  • MD5

    85d7261abe81a306c834e86e5985c4b4

  • SHA1

    88a62461914fe7c8f9ce7bfb92bc3d6f76071f34

  • SHA256

    45304df66ae26f24a75731abbab292eb112f15fae33f7cea073a09203439fc0c

  • SHA512

    cecf4e7e032d0d01feb42b02a8bcbe95155103f9204f3ddbcd0d1d4fe4ebec847bc7d68b4e845c2ed9b6954438324917b69195a81c5b5234f800b4225d741821

  • SSDEEP

    384:x/oe8zdTyBsyqAIZhgfxKRVpo7H5R3T4pwf1hhhJ2VbCrzW0XWkVbZb7OF:8WsyqAggfdzkqb4iHFIF

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85d7261abe81a306c834e86e5985c4b4.exe
    "C:\Users\Admin\AppData\Local\Temp\85d7261abe81a306c834e86e5985c4b4.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\cacls.exe
      "C:\Windows\System32\cacls.exe" c:\windows\system32\packet.dll /e /p everyone:f
      2⤵
        PID:240
      • C:\Windows\SysWOW64\cacls.exe
        "C:\Windows\System32\cacls.exe" c:\windows\system32\pthreadVC.dll /e /p everyone:f
        2⤵
          PID:2516
        • C:\Windows\SysWOW64\cacls.exe
          "C:\Windows\System32\cacls.exe" c:\windows\system32\wpcap.dll /e /p everyone:f
          2⤵
            PID:3048
          • C:\Windows\SysWOW64\cacls.exe
            "C:\Windows\System32\cacls.exe" c:\windows\system32\drivers\npf.sys /e /p everyone:f
            2⤵
              PID:1164
            • C:\Windows\SysWOW64\cacls.exe
              "C:\Windows\System32\cacls.exe" c:\windows\system32\npptools.dll /e /p everyone:f
              2⤵
                PID:2800
              • C:\Windows\SysWOW64\cacls.exe
                "C:\Windows\System32\cacls.exe" c:\windows\system32\drivers\acpidisk.sys /e /p everyone:f
                2⤵
                  PID:2948
                • C:\Windows\SysWOW64\cacls.exe
                  "C:\Windows\System32\cacls.exe" c:\windows\system32\wanpacket.dll /e /p everyone:f
                  2⤵
                    PID:2852
                  • C:\Windows\SysWOW64\cacls.exe
                    "C:\Windows\System32\cacls.exe" c:\Documents and Settings\All Users\¡¸¿ªÊ¼¡¹²Ëµ¥\³ÌÐò\Æô¶¯ /e /p everyone:f
                    2⤵
                      PID:2592

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/2212-0-0x0000000013140000-0x000000001314B000-memory.dmp

                    Filesize

                    44KB

                  • memory/2212-3-0x0000000013140000-0x000000001314B000-memory.dmp

                    Filesize

                    44KB

                  • memory/2212-2-0x0000000000020000-0x000000000002B000-memory.dmp

                    Filesize

                    44KB

                  • memory/2212-1-0x0000000000020000-0x000000000002B000-memory.dmp

                    Filesize

                    44KB