Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2024, 02:37

General

  • Target

    8854b2365cef342cb18c6d0c6e7a85ef.exe

  • Size

    356KB

  • MD5

    8854b2365cef342cb18c6d0c6e7a85ef

  • SHA1

    8b406a50058330322cdd0dd2c4f5b245f5660a36

  • SHA256

    969bdb79501e09836ba8a170453825ea26381d97503356cbf5f67410bf96a912

  • SHA512

    bab5409e744a0242ccf5fb4abb422180cf7cab8b27bb7ac783eaaa6854022a26b8e58a81c7f3044bd2a272f991796884c138998ddd54d04c45b5e36e5d77ed3f

  • SSDEEP

    6144:qa3kdF60F55G0Tpg1Y+aPET0VcI9+TVS0tQ5Ue9ISPBARQ2XDA+iXeoS:XUdw080KqBPEPIYTVZ2Ue9LPGeRuoS

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8854b2365cef342cb18c6d0c6e7a85ef.exe
    "C:\Users\Admin\AppData\Local\Temp\8854b2365cef342cb18c6d0c6e7a85ef.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:640
  • C:\Program Files (x86)\Internet Explorer\Connection Wizard\icwupda.exe
    "C:\Program Files (x86)\Internet Explorer\Connection Wizard\icwupda.exe"
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" %1
      2⤵
        PID:3276

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Internet Explorer\Connection Wizard\icwupda.exe

      Filesize

      356KB

      MD5

      8854b2365cef342cb18c6d0c6e7a85ef

      SHA1

      8b406a50058330322cdd0dd2c4f5b245f5660a36

      SHA256

      969bdb79501e09836ba8a170453825ea26381d97503356cbf5f67410bf96a912

      SHA512

      bab5409e744a0242ccf5fb4abb422180cf7cab8b27bb7ac783eaaa6854022a26b8e58a81c7f3044bd2a272f991796884c138998ddd54d04c45b5e36e5d77ed3f

    • memory/640-0-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/640-1-0x00000000007B0000-0x00000000007B1000-memory.dmp

      Filesize

      4KB

    • memory/640-9-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/4876-8-0x0000000000740000-0x0000000000741000-memory.dmp

      Filesize

      4KB

    • memory/4876-10-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/4876-12-0x0000000000740000-0x0000000000741000-memory.dmp

      Filesize

      4KB

    • memory/4876-14-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/4876-17-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/4876-18-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB

    • memory/4876-22-0x0000000000400000-0x00000000004B8000-memory.dmp

      Filesize

      736KB