Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2024, 05:03

General

  • Target

    9650e00ef30bc7abe8becec63619e47c.exe

  • Size

    516KB

  • MD5

    9650e00ef30bc7abe8becec63619e47c

  • SHA1

    295a2a3b936f4d59134f0f9a1869220784de8a66

  • SHA256

    93b16aa9542c8f7cc4b6cf48ce2f51cb3b97b71f055792d21209854cefb87d1a

  • SHA512

    cbb68eca8094820f85242284663023f0bbc54d18a60c5f9eacae0db9ab32166e3b23c052b6861bc059ebd819b195af91a84f49cbeb48163083b1a3e5d2d43ff3

  • SSDEEP

    12288:IDOCHBIeaaSjCSwtqg3lgvGJCSWMiHaWvwLU4U9xjZ:IMj0Wl+8VMiLr

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 10 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9650e00ef30bc7abe8becec63619e47c.exe
    "C:\Users\Admin\AppData\Local\Temp\9650e00ef30bc7abe8becec63619e47c.exe"
    1⤵
    • Drops autorun.inf file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • Adds policy Run key to start application
      • Modifies Installed Components in the registry
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4872
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4660
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:4464
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4496
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2948
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\facebook.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\facebook.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4588
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\facebook.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\facebook.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:2076
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4448
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • Modifies registry key
          PID:3816
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 868
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:384

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4872-25-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/4872-31-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/4872-36-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/4872-3-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/4872-5-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/4872-35-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/4872-22-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/4872-23-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/4872-32-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/4872-26-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/4872-27-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/4872-28-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/4872-29-0x0000000000400000-0x000000000044F000-memory.dmp

          Filesize

          316KB

        • memory/4976-0-0x00000000750D0000-0x0000000075681000-memory.dmp

          Filesize

          5.7MB

        • memory/4976-1-0x00000000750D0000-0x0000000075681000-memory.dmp

          Filesize

          5.7MB

        • memory/4976-21-0x00000000750D0000-0x0000000075681000-memory.dmp

          Filesize

          5.7MB

        • memory/4976-2-0x0000000001AA0000-0x0000000001AB0000-memory.dmp

          Filesize

          64KB