Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 02:30

General

  • Target

    2165a0d28ca7da9dcccd1890b7fae09037b23090c16d7e6877de89667e7aa27b.exe

  • Size

    698KB

  • MD5

    c4739b56271d3d99ff7449053f997e76

  • SHA1

    578cb65ac1f0660c06a61b2be36f3f60d5b0ae98

  • SHA256

    2165a0d28ca7da9dcccd1890b7fae09037b23090c16d7e6877de89667e7aa27b

  • SHA512

    7e6a0934b695b66df33a21aff9d58768336ea3a6300ba55bb1b6424ea0912a3aeb1e20b3f03fb989eadee3dfd6ebcb9df85f6b69dd0c3db518c23e82a380caec

  • SSDEEP

    12288:oaEzqHKMbNqM8hu6Vw6xPgxb453SHmYrn1HnfFokjg1YG4s/QdMqZlWZYsYb9JVz:oxz87bfB/DtxGYhfFo+G4suJDWZYsyVt

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2165a0d28ca7da9dcccd1890b7fae09037b23090c16d7e6877de89667e7aa27b.exe
    "C:\Users\Admin\AppData\Local\Temp\2165a0d28ca7da9dcccd1890b7fae09037b23090c16d7e6877de89667e7aa27b.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ECEmLaic.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3060
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ECEmLaic" /XML "C:\Users\Admin\AppData\Local\Temp\tmp435.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2128
    • C:\Users\Admin\AppData\Local\Temp\2165a0d28ca7da9dcccd1890b7fae09037b23090c16d7e6877de89667e7aa27b.exe
      "C:\Users\Admin\AppData\Local\Temp\2165a0d28ca7da9dcccd1890b7fae09037b23090c16d7e6877de89667e7aa27b.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2912
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 36
        3⤵
        • Program crash
        PID:2960

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp435.tmp

          Filesize

          1KB

          MD5

          e55860e7bf2b884fc2fa0cbeb4e370ab

          SHA1

          d263531da2d47ab5ecef22ccd0e3a1206cf46e4f

          SHA256

          86d0abbfed6d8f2a3adaa55fbc09702ea8d6774f1c4d3537d9c7605c6a812098

          SHA512

          c1c5fef17cc41e9b6487ef1603f805acb08c8d947fca14573556dc8c8a34d4f49ddff686da8cf09a1a4aa38e63b737fffb8511141cfa8c3cf6ad1794acf80908

        • memory/1996-22-0x0000000074340000-0x0000000074A2E000-memory.dmp

          Filesize

          6.9MB

        • memory/1996-1-0x0000000074340000-0x0000000074A2E000-memory.dmp

          Filesize

          6.9MB

        • memory/1996-2-0x0000000001F80000-0x0000000001FC0000-memory.dmp

          Filesize

          256KB

        • memory/1996-3-0x0000000001FD0000-0x0000000001FE4000-memory.dmp

          Filesize

          80KB

        • memory/1996-4-0x0000000004950000-0x000000000495A000-memory.dmp

          Filesize

          40KB

        • memory/1996-5-0x0000000004960000-0x000000000496E000-memory.dmp

          Filesize

          56KB

        • memory/1996-6-0x0000000005960000-0x00000000059EC000-memory.dmp

          Filesize

          560KB

        • memory/1996-7-0x0000000074340000-0x0000000074A2E000-memory.dmp

          Filesize

          6.9MB

        • memory/1996-8-0x0000000001F80000-0x0000000001FC0000-memory.dmp

          Filesize

          256KB

        • memory/1996-0-0x0000000000850000-0x0000000000904000-memory.dmp

          Filesize

          720KB

        • memory/2912-16-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2912-19-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2912-21-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/2912-18-0x0000000000400000-0x000000000043F000-memory.dmp

          Filesize

          252KB

        • memory/3060-23-0x000000006E6D0000-0x000000006EC7B000-memory.dmp

          Filesize

          5.7MB

        • memory/3060-24-0x0000000002710000-0x0000000002750000-memory.dmp

          Filesize

          256KB

        • memory/3060-25-0x000000006E6D0000-0x000000006EC7B000-memory.dmp

          Filesize

          5.7MB

        • memory/3060-26-0x0000000002710000-0x0000000002750000-memory.dmp

          Filesize

          256KB

        • memory/3060-27-0x000000006E6D0000-0x000000006EC7B000-memory.dmp

          Filesize

          5.7MB