Analysis

  • max time kernel
    174s
  • max time network
    166s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 20:02

General

  • Target

    9007935433fb0a2d37a06d693ed2b9b4.exe

  • Size

    3.5MB

  • MD5

    9007935433fb0a2d37a06d693ed2b9b4

  • SHA1

    ad736badde11734793f68dfac81b005d1ce9400e

  • SHA256

    1c3e60eee014c1b949ccbafbc774813c8b1cf037f92b098413316f81a0051d07

  • SHA512

    d3567276abb9c514876f23a3e3e65bc6501ae80e685036b17389c98e36574b1f12071b120ccfb727c48268ce57c54b502bacf847227137ff0960961b76235c48

  • SSDEEP

    98304:ALl9u5BUr02LzIkumfJLBl2sMqi+ClAn8:k0EzDxLxxi+xn

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 24 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9007935433fb0a2d37a06d693ed2b9b4.exe
    "C:\Users\Admin\AppData\Local\Temp\9007935433fb0a2d37a06d693ed2b9b4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\UpdateSign.exe
      "C:\Users\Admin\AppData\Local\Temp\UpdateSign.exe" FPT.SIGN
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Users\Admin\AppData\Local\Temp\FPT.SIGN.exe
        "C:\Users\Admin\AppData\Local\Temp\FPT.SIGN.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:520
        • C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys
          C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" BaoPQAP.dll "C:\Users\Admin\AppData\Local\Temp" /o+
          4⤵
          • Executes dropped EXE
          PID:616
        • C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys
          C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" Interop.IWshRuntimeLibrary.dll "C:\Users\Admin\AppData\Local\Temp" /o+
          4⤵
          • Executes dropped EXE
          PID:1644
        • C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys
          C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" itextsharp.dll "C:\Users\Admin\AppData\Local\Temp" /o+
          4⤵
          • Executes dropped EXE
          PID:2908
        • C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys
          C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" Core2Duo.dll "C:\Users\Admin\AppData\Local\Temp" /o+
          4⤵
          • Executes dropped EXE
          PID:2232
        • C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys
          C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" WindowsBase.dll "C:\Users\Admin\AppData\Local\Temp" /o+
          4⤵
          • Executes dropped EXE
          PID:828
        • C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys
          C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys e -ep "C:\Users\Admin\AppData\Local\Temp\DLL.rar" times.ttf "C:\Users\Admin\AppData\Local\Temp" /o+
          4⤵
          • Executes dropped EXE
          PID:396
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\48gykkzz.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2472
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEB1.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCEB0.tmp"
            5⤵
              PID:1292

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys

            Filesize

            286KB

            MD5

            d263d26a2be8d971273f6c9fa2ec6608

            SHA1

            db3125ad35021ef9acda9ba58122b808353463e9

            SHA256

            0c230aae90bbb8756eb7b6aeb4a19d552e53d50f56b18cd386824f8827ac976b

            SHA512

            8d3b8062840f05311a3cf43e3e6454d5c7140fff7f9361b279e930731320ea34273e95f543423b9b864e4241b283ab6f3f15b5481eb32965059b62fd279e53f0

          • C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys

            Filesize

            239KB

            MD5

            49408468e270889459c6d4fa755264b2

            SHA1

            e1f532dfec7c85f04b5dea9b76eb880afb2a97fe

            SHA256

            999c5d8b7e0b8494319585d11394a190564d7c6e75f3646df2723580d57e3e1a

            SHA512

            5ca1a89b235538559a28af8882df60f1c3f538022fc7ed37a8bad0df117799fed37734186ba5203797db4eb0da37547d76786bb3270627f1985bec1f5ae4f313

          • C:\Users\Admin\AppData\Local\Temp\$Temp\extractor.sys

            Filesize

            85KB

            MD5

            1bc95e5f33c7093bc1d19a89b3dceb83

            SHA1

            0faa3b4ad36ec4aedbd949b50e05142c90396395

            SHA256

            d2c1cef96b08b52ffb2212776ab8ddd4aa43340b35707a2dbb54ddaa0dffacf3

            SHA512

            d92673939531b3dbacb816c5fb93c7791f79f23b913dde2f7d1bebc457dffcd3957ebb2f5ace04a7b630ff4a6656237358494bf0dddc65c7a2907cb92a0bab20

          • C:\Users\Admin\AppData\Local\Temp\48gykkzz.dll

            Filesize

            8KB

            MD5

            05dbca09192623f356299a7266a1956c

            SHA1

            7ef66bf587ea7067be68b7abe906a981ed07ddee

            SHA256

            f6238930f3db39e9c88841ed390d2899497212bc7c7647d6b57e2629d916564b

            SHA512

            c08642aac4b2ddb9c6a04e1a9fc3fef028c25e2b63951eceba10f4aa0950d4a9633bb691458778b27ef69bd2c2e7e02acc0b4924b06705dc09b201d4de67f39f

          • C:\Users\Admin\AppData\Local\Temp\CabD7F9.tmp

            Filesize

            65KB

            MD5

            ac05d27423a85adc1622c714f2cb6184

            SHA1

            b0fe2b1abddb97837ea0195be70ab2ff14d43198

            SHA256

            c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

            SHA512

            6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

          • C:\Users\Admin\AppData\Local\Temp\Core2Duo.dll

            Filesize

            5.0MB

            MD5

            7f1a1d45e5d0b9abff554ce0c639209b

            SHA1

            472898b783c1cf052726e63af96244506175241e

            SHA256

            0322b87bb01d6becf004894b28a8359d28fc1b0d2a016ba2bffc8eb4a0169a79

            SHA512

            48fc7540f2ebdc22b6c06b1b8c54cc5416b0ad8b4713cc91dd05de516f0bc6de26358eba9c5914aeac2050ebb4471df066efb4406342c2c397da993d9dc98aa1

          • C:\Users\Admin\AppData\Local\Temp\DLL.rar

            Filesize

            1.3MB

            MD5

            c7a482ac5d6df0787bec81661464de14

            SHA1

            2911091a0d8587f2c4b0c6d19394ade475f00a7c

            SHA256

            c24ebd4542386c649193f01e7e451feb240af28d76dfd7170d3771d1e9a2f8e3

            SHA512

            60275e60b9caf6d805b0135bd125b2fffc17679a6b0624c3976e8acdc16a695f545fc7377b0526890b2f915f64db373020711a998c6123b8ba89010809713718

          • C:\Users\Admin\AppData\Local\Temp\Del.txt

            Filesize

            36B

            MD5

            f3bdd189f7d29eddafa70e50fc413106

            SHA1

            e9373849a75ba669f7c6d15fdf3eab5693804a96

            SHA256

            472e424bd56886611566ba282bdc24b1a0ee95c9cf7c16b36ba21a356a3934a3

            SHA512

            272fea295d05b0b8556f93440dfd3fb1884f5028c0d20dfe9712efd78c393e6d35ec3e7f8577f4ed666adc4031ebb4a5db290845df73a89c12c963dd274c2ae4

          • C:\Users\Admin\AppData\Local\Temp\FPT.SIGN.exe

            Filesize

            3.3MB

            MD5

            3c7c9a7e16e1ef5b3bfb751e1bf287b6

            SHA1

            505fc28f75726e8a2f87aaa687c177808ece175e

            SHA256

            b4897d738e9923c375d751a208975bc03100f46dc2c7d9ae5139ef41b4792345

            SHA512

            6dcb06ee13aeb06427e76f8672435f7c02692829ed03f61778a56465c7cd058d5b8162eb25aab32ef7ebe0142f2fef0077486bd71dc1e90f1850bbf6e35bdf94

          • C:\Users\Admin\AppData\Local\Temp\FPT.SIGN.exe.NEW

            Filesize

            3.5MB

            MD5

            9007935433fb0a2d37a06d693ed2b9b4

            SHA1

            ad736badde11734793f68dfac81b005d1ce9400e

            SHA256

            1c3e60eee014c1b949ccbafbc774813c8b1cf037f92b098413316f81a0051d07

            SHA512

            d3567276abb9c514876f23a3e3e65bc6501ae80e685036b17389c98e36574b1f12071b120ccfb727c48268ce57c54b502bacf847227137ff0960961b76235c48

          • C:\Users\Admin\AppData\Local\Temp\Interop.IWshRuntimeLibrary.dll

            Filesize

            48KB

            MD5

            fe7bc6145e8e24343ea6df5520a19a88

            SHA1

            8533955757a940bf3c549abe9eae5378ed8dcc14

            SHA256

            da0427575eeab93892e01d36d3064bb0e6bfdfad247c6193968fffba6ab70ae4

            SHA512

            35037af75893a17f847fcf7ed85d891a899423dda724fbfe651d301c2de53a4b56fde4f6eba6b2f505a81a623f8ee5edb70877ac5ee7048fdc07cccc7c2978e6

          • C:\Users\Admin\AppData\Local\Temp\RESEB1.tmp

            Filesize

            1KB

            MD5

            8514f55967231d756d33050293bc1687

            SHA1

            40bd06a1165ba4c2577caeaf944ac38f2f582293

            SHA256

            bf36a8b0f31bade193aa36cb62333a0a8c2f14460e32b7ccc0fee7909da45978

            SHA512

            c8f0687505f1a6788a519fe7dde413695e4b24d6154b4ff35de26b90886ae94729dbc2a8bce30ac2077d09decf34f68f342081daa25d45cf4dbc5b99020eb0b0

          • C:\Users\Admin\AppData\Local\Temp\TarD83B.tmp

            Filesize

            171KB

            MD5

            9c0c641c06238516f27941aa1166d427

            SHA1

            64cd549fb8cf014fcd9312aa7a5b023847b6c977

            SHA256

            4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

            SHA512

            936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

          • \??\c:\Users\Admin\AppData\Local\Temp\48gykkzz.0.cs

            Filesize

            10KB

            MD5

            0cf50a165cbc68b7bc294727b472f720

            SHA1

            131c40088cb3a37b38f54d8f0762ae3b74f9908c

            SHA256

            2860ff4c799db4c1e473eb8626ad1ef05d9bba58b7c870ea148e0ff6597844c7

            SHA512

            ebc387c1c3df34d5222f91c2af873f733b586e36b284bc3200bc0793831b723bee77948ca23231ac28d44a4be56364f90f6cdeded2e3468d758441bf601d4ef9

          • \??\c:\Users\Admin\AppData\Local\Temp\48gykkzz.cmdline

            Filesize

            581B

            MD5

            2e7cc4a9a0f4d72efd1fc8d6cf77627e

            SHA1

            6ecfef2fe22db1cd0c25d4383b4dfd8b9239dbbc

            SHA256

            cc11d59b8978349040baf43035b2b88cef7745e7bf7eba3dbb42824f51c41f79

            SHA512

            48e64b3132db906ba64d50d9d971aba77acf1609311c4553c153f280c96bfe771e640e8fd9bcf6f5f9f26ad15d3d5f388f4440055e2c6948cfdf60e1cdcbc1b0

          • \??\c:\Users\Admin\AppData\Local\Temp\CSCEB0.tmp

            Filesize

            652B

            MD5

            6c106e3407e36feae51041ad5f0f793c

            SHA1

            1f3830f472ad18f7ce8405f2a6c6fdc427731b78

            SHA256

            a8a4c3e51a07a58be2a9451d8ace43a1bef2d2d76bdea76f4c30cc4fc7abfdae

            SHA512

            3e074c7d0b33940a0732802068d5dc4b51354d438094f970b207f6c0aa89f9e622871d37f6a90ee459f01e581c2a79e141dc42849bcbcf0171e4577a06349acb

          • \Users\Admin\AppData\Local\Temp\$Temp\extractor.sys

            Filesize

            236KB

            MD5

            42221ab71ca5ae2c78c74d49152fd21d

            SHA1

            ab620e964f396fb0e6ec9a2c8a201f9058c526eb

            SHA256

            12deef3d9a534223dac0c0d710b6c11ce1320e3f666bfc07de404de46437a436

            SHA512

            4f3f7196618e8f854ed29ae2ba373f18487c02846f7064cf84316721e40297825b16c2cbe12defeca87de7345a544b74bffe9116f872f7409f4ca64984105254

          • \Users\Admin\AppData\Local\Temp\$Temp\extractor.sys

            Filesize

            109KB

            MD5

            082b0e376ef4742dd7c8a02252294a95

            SHA1

            6949e524fa93c35ba60e3ea294a30cf1dfbb38a6

            SHA256

            1fb000ce1c3e4dd072dfd743b3c4c0c64da173a9e0f0c2980910dd8b8ee42948

            SHA512

            284d8f8abba6a558e2c67069f74860de36a0c26cf9095c600642de035637710b5a9faeafcc21816b01add75deffc21b8763a773c75ca9d6155054a885e7c58e1

          • \Users\Admin\AppData\Local\Temp\$Temp\extractor.sys

            Filesize

            89KB

            MD5

            179817560575c8a168870b5e040f97b6

            SHA1

            f9582f85d4033c961f58c08bb9e8cd7af32f0fd9

            SHA256

            9289ac96ae249d30a8eb00c9204b307d50208f1e3c11ad26a7effdd1ccb0ccee

            SHA512

            5f2ee62ed9e768291d9de8393a14fb353717ead99b95e70b4688fc8f9e0afdc325845f411a73d50393707aac06dcab272d7488021dc60e22c6294a9dc76b629b

          • \Users\Admin\AppData\Local\Temp\BaoPQAP.dll

            Filesize

            26KB

            MD5

            a98caf99fcb3485b78ab3d6ae4dbfec3

            SHA1

            3dd2fcd8fa90851d359cc98ace3985456a0796ac

            SHA256

            c91d2900e45c463cd37703b805ffd82addf9b558445c7a156536d58665b45b24

            SHA512

            cc72aa37fa6c0996d8e79efee50bd84adef031143a5ca0c175ee8a96b7ac5c8df0424261deb00a0fdc77e4ecb2c437151d3a3c76bf4723ac5603ce3550d29c9a

          • \Users\Admin\AppData\Local\Temp\FPT.SIGN.exe

            Filesize

            2.6MB

            MD5

            aef112643a431f673d7337b8df3cc0de

            SHA1

            3e6b0dd4f139056c7269946b3f21f91abd24e723

            SHA256

            677bf46b105a2b58219b0ae100e490bb32067c08fbe1c296c9e4cfcae95d9c1a

            SHA512

            97aad879acd516efe129a9f717b0e01aba7185a5901b96045a054bf3eb40c94a7ff1086489822a0d52b72baa67f97a8a02027c2529ded15d5f20d39eea60bc12

          • \Users\Admin\AppData\Local\Temp\UpdateSign.exe

            Filesize

            11KB

            MD5

            e9e15eb0cefd6d9e1144276f617b638e

            SHA1

            da896c0efcade6e6b07517a269da9978000d8baf

            SHA256

            cba4455ebcfe3a5a14dbc52ad2c59f9c11088ce1653e2afa1528ea5a6558fd3d

            SHA512

            fcab8df58fdf2b4d147ed871c38cff34e94c6ca27bd5bc9109fe7049ab0ab62aac0a62980257b10ff3b74844102b1f04e68a22092c02896402a7c4837949ed76

          • memory/396-157-0x0000000000400000-0x000000000045A000-memory.dmp

            Filesize

            360KB

          • memory/520-163-0x0000000000A10000-0x0000000000A50000-memory.dmp

            Filesize

            256KB

          • memory/520-90-0x0000000000A10000-0x0000000000A50000-memory.dmp

            Filesize

            256KB

          • memory/520-190-0x0000000000A10000-0x0000000000A50000-memory.dmp

            Filesize

            256KB

          • memory/520-189-0x0000000000A10000-0x0000000000A50000-memory.dmp

            Filesize

            256KB

          • memory/520-188-0x0000000000A10000-0x0000000000A50000-memory.dmp

            Filesize

            256KB

          • memory/520-187-0x0000000074610000-0x0000000074BBB000-memory.dmp

            Filesize

            5.7MB

          • memory/520-89-0x0000000074610000-0x0000000074BBB000-memory.dmp

            Filesize

            5.7MB

          • memory/520-91-0x0000000074610000-0x0000000074BBB000-memory.dmp

            Filesize

            5.7MB

          • memory/520-92-0x0000000000A10000-0x0000000000A50000-memory.dmp

            Filesize

            256KB

          • memory/616-107-0x0000000000400000-0x000000000045A000-memory.dmp

            Filesize

            360KB

          • memory/828-147-0x0000000000400000-0x000000000045A000-memory.dmp

            Filesize

            360KB

          • memory/1200-0-0x0000000074610000-0x0000000074BBB000-memory.dmp

            Filesize

            5.7MB

          • memory/1200-85-0x0000000074610000-0x0000000074BBB000-memory.dmp

            Filesize

            5.7MB

          • memory/1200-2-0x0000000000120000-0x0000000000160000-memory.dmp

            Filesize

            256KB

          • memory/1200-1-0x0000000074610000-0x0000000074BBB000-memory.dmp

            Filesize

            5.7MB

          • memory/1644-117-0x0000000000400000-0x000000000045A000-memory.dmp

            Filesize

            360KB

          • memory/2232-137-0x0000000000400000-0x000000000045A000-memory.dmp

            Filesize

            360KB

          • memory/2600-14-0x0000000074610000-0x0000000074BBB000-memory.dmp

            Filesize

            5.7MB

          • memory/2600-13-0x0000000000290000-0x00000000002D0000-memory.dmp

            Filesize

            256KB

          • memory/2600-12-0x0000000074610000-0x0000000074BBB000-memory.dmp

            Filesize

            5.7MB

          • memory/2600-103-0x0000000074610000-0x0000000074BBB000-memory.dmp

            Filesize

            5.7MB

          • memory/2908-127-0x0000000000400000-0x000000000045A000-memory.dmp

            Filesize

            360KB