Analysis

  • max time kernel
    93s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 04:11

General

  • Target

    9636c8109a089ac114568bab569b4faa.exe

  • Size

    637KB

  • MD5

    9636c8109a089ac114568bab569b4faa

  • SHA1

    e477d3d91c639063d82565444ccaba1d13307bda

  • SHA256

    2203901682d305361ed7a25a749d141bbba71d0c1a6b279e8bbbf1a62c63179e

  • SHA512

    81fa1c5c4ae6511b70a2d57602a8eaa08c136d3ba83c7109ff143dd3c7072e7c48cd8200e9ff278ee78b188858f99b860593b9f0f123c9026eb4b195046b9084

  • SSDEEP

    12288:2S8YS8K/8hIeI8Pzqn8/9dYd2svmt1FknuFiQOFYLcc6UplYfc8vy4he2:2vL808+AG6t1F2HYLzd86R2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9636c8109a089ac114568bab569b4faa.exe
    "C:\Users\Admin\AppData\Local\Temp\9636c8109a089ac114568bab569b4faa.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Users\Admin\AppData\Local\Temp\bedgbfbheb.exe
      C:\Users\Admin\AppData\Local\Temp\bedgbfbheb.exe 4,9,1,3,1,1,9,5,7,4,3 K0dIQTw2KisrHCxPTEFNSEM0KxkrS0FLVkxRSkA/NiwdKztIUFNIOzgqLTQtKh8sQkg7OCkcLExJTkFUQktaQkA6LS04MR8uSkBLUkJOVlRPSzxfb21sNysmcm91LTtATEcqUEZPKkBPRylCSkNLFy5AS0g6RkJAOkJecUJFZU1gP1RTXytecmRmajFnSXM1OXk0dVRqR1wxakNQcWVLSD1UYU9NdF5LUm44RFQ/Ym1IRUtrVUIpXTwpaT5RSTNzVi1IYXUwbStWSEFCQlVMVDBzX1ZWVU0qcnBWPlthS2AvZExmKjJmQl9qPndGUS1nXV5RbTA2VWU4LGdUVD1HNENEXmZjXTEuYzxMKnJnVk46QUN1Z05oQExHdWdyaDVQdWBwQWVOZGR2bC5pYC9oZ0NGbElNUTc0NWxiLi9xc0JQTF81SWA9YUVPST5yYDNDKlpLaSoyT2xTSmY4U15IdHRBdk81WWBxRlJjZzw4ZB8uOyw2MjEuJx8sQzE0KCocLEAqPCowHyY/LTkqLRcuQTQ8JCwZK01ORkNSQlNWS0tFUz06WDofLkdNSEBSP0teQlRLODgZK01ORkNSQlNWSTpJQjkXLkJXRFZQS0g6HCZEVUReOkg9SEZKPDwdLkdGTk1bP05GVlBEUTQrGStRRDhNSFhOTFpOTkk5Fy5TTDwpGyhAUC00HyxRVEVPQklCW05ESUJOREBCST5DPFRPSzwXKkJPXE5MTVFITDw4bW5yYRcuT0RTTE1HRUtDVlRQRFFWPzpVUDkpHyxHSDtAUTkuHCZIUF5DUEk6SUY/VkRLQlFQS01BQTldYGlyZBcqPUtUSkNOPkNeQEs2LS0zJTA0Ny0oNC4qLy0wHyxPQEk8RUhCSFZIS1JTOEdFOWNdY3JiHy5LREZBOi0rMjMwNDAsMDEdKztOVE1LRjw9W1FFREQ6Ni4tKissLjEhNDcvNTEsLiY+SQ==
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3080
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81707711108.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4452
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81707711108.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:552
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81707711108.txt bios get version
        3⤵
          PID:800
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81707711108.txt bios get version
          3⤵
            PID:1952
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81707711108.txt bios get version
            3⤵
              PID:2568
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 960
              3⤵
              • Program crash
              PID:4472
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3080 -ip 3080
          1⤵
            PID:4280

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\81707711108.txt

                  Filesize

                  66B

                  MD5

                  9025468f85256136f923096b01375964

                  SHA1

                  7fcd174999661594fa5f88890ffb195e9858cc52

                  SHA256

                  d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

                  SHA512

                  92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

                • C:\Users\Admin\AppData\Local\Temp\81707711108.txt

                  Filesize

                  2B

                  MD5

                  f3b25701fe362ec84616a93a45ce9998

                  SHA1

                  d62636d8caec13f04e28442a0a6fa1afeb024bbb

                  SHA256

                  b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                  SHA512

                  98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                • C:\Users\Admin\AppData\Local\Temp\81707711108.txt

                  Filesize

                  58B

                  MD5

                  dd876faf0fd44a5fab3e82368e2e8b15

                  SHA1

                  01b04083fa278dda3a81705ca5abcfee487a3c90

                  SHA256

                  5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

                  SHA512

                  e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

                • C:\Users\Admin\AppData\Local\Temp\bedgbfbheb.exe

                  Filesize

                  771KB

                  MD5

                  4ebd7055b043c197b804dea7b0471b3e

                  SHA1

                  c89a909e02e9045cc1b5bdf3f6555259b7dc42d6

                  SHA256

                  ec7f387bb9054bb6f89d7f6d101a2124cf1c43875b217024be0789d25d8daa50

                  SHA512

                  fd19e6656603be265b50999cec7171455510d95c58167b68d35ed51baed77845d8c4b2c0c9649726c2cd5913c00a012bbb0a4b43de83f163f5476d8f9d8b3264

                • C:\Users\Admin\AppData\Local\Temp\nsl7010.tmp\ZipDLL.dll

                  Filesize

                  163KB

                  MD5

                  2dc35ddcabcb2b24919b9afae4ec3091

                  SHA1

                  9eeed33c3abc656353a7ebd1c66af38cccadd939

                  SHA256

                  6bbeb39747f1526752980d4dbec2fe2c7347f3cc983a79c92561b92fe472e7a1

                  SHA512

                  0ccac336924f684da1f73db2dd230a0c932c5b4115ae1fa0e708b9db5e39d2a07dc54dac8d95881a42069cbb2c2886e880cdad715deda83c0de38757a0f6a901

                • C:\Users\Admin\AppData\Local\Temp\nsl7010.tmp\dfstmip.dll

                  Filesize

                  161KB

                  MD5

                  5f5bca16e33f49e1db2733f1c52c030c

                  SHA1

                  46fb70ff5a65319aa5d1a0aa5fd2aeadcf979541

                  SHA256

                  64f00ed0cac06df5d9ef74b16b157b85e7195488c7f1a24bf042b9f129db3212

                  SHA512

                  fde419a7a7977f4e30eeaa26775644d5142d05939369c70e20c78603697f58b765bcc82bf9cd16e4a6363a063f9c8307e06f3cf2389209d6fb23a525ba4d3c77