Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 04:09

General

  • Target

    987080eb9b427abf6963c965f0df5d14.exe

  • Size

    583KB

  • MD5

    987080eb9b427abf6963c965f0df5d14

  • SHA1

    f627cdb543aa00dbdde3f27ad1a956e982e973c4

  • SHA256

    21c3006f3a7d779db187f1236d1deb0a6a8b598d3e91014d6ea55de1f0514a61

  • SHA512

    881e6a2a96ca72ca07d54498380ac331f955ba5b090aa8c86dcfe44b2800a72a2d76be2906e4f3a3878a7ea55769d382d87c45290d3ab769a58a9bd963b453d5

  • SSDEEP

    12288:ZDzR23Nj3l//4QNtGZtZuRBEcu3mftMeyArcq5tCf66FI:ZDzi//4QNsZtZMG3mftRyAlDCfA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\987080eb9b427abf6963c965f0df5d14.exe
    "C:\Users\Admin\AppData\Local\Temp\987080eb9b427abf6963c965f0df5d14.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\AppData\Local\Temp\bccbcabebbbig.exe
      C:\Users\Admin\AppData\Local\Temp\bccbcabebbbig.exe 2-4-5-4-7-6-4-7-8-8-0 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81707797374.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2744
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81707797374.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2756
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81707797374.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2732
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81707797374.txt bios get version
        3⤵
          PID:2600
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81707797374.txt bios get version
          3⤵
            PID:2492
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 368
            3⤵
            • Loads dropped DLL
            • Program crash
            PID:864

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\81707797374.txt

              Filesize

              66B

              MD5

              9025468f85256136f923096b01375964

              SHA1

              7fcd174999661594fa5f88890ffb195e9858cc52

              SHA256

              d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

              SHA512

              92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

            • C:\Users\Admin\AppData\Local\Temp\bccbcabebbbig.exe

              Filesize

              447KB

              MD5

              4d7f58160c1f67923af1597f7564fc50

              SHA1

              018777ae9c25dc5465cccbd7b690e143d0eac288

              SHA256

              3b3f7d8c909a5e45c0b4625ebcae16004531e9ce46992e214da381f49f76a1a4

              SHA512

              be5682057ec68e3564dd12135c714fbdb08c5483dcc634964f4792000306d860256819c335fb611d686327bd7435c33fc6ab54eefc09aba42da01f3c3f78a33a

            • C:\Users\Admin\AppData\Local\Temp\nsoD4B.tmp\ooi.dll

              Filesize

              122KB

              MD5

              2690b36fa914f15c6532dbc1a4f1158d

              SHA1

              8f0d38bcb9081058c8c249b12994004f5115c70e

              SHA256

              70f39e836f56eee07099c64d28dda45cf3176eb808f38833b732fb5b5318accb

              SHA512

              d2092cfc876ff2fb0686b577a6ef82dca43ec3eb91c7547103f34bbc88b3fbe93c67a864f0501aa4f07b004c0493fda6822292247623bbc30de2a6ff9ecd00c0

            • \Users\Admin\AppData\Local\Temp\bccbcabebbbig.exe

              Filesize

              478KB

              MD5

              56d26a2e18a0fe963f6bfb08ca237a05

              SHA1

              7f94d6aee79b69935cadcc698c89b72fe4ef9bfe

              SHA256

              592161d74fe1b4a002cdec048bfe407504df989148c9de75c089317d93ce56fa

              SHA512

              81ca4c5b39b2f89f9e64930b65ce35887df66e46aeb52953540116f483d21fec3129dd996978f33f422201bed5d06453ae0a5a4df33aaaf5aaae4358730dafec

            • \Users\Admin\AppData\Local\Temp\bccbcabebbbig.exe

              Filesize

              828KB

              MD5

              0adc7f537666ffe70bd29be8db85bdc3

              SHA1

              c831f7a9e8a396bd5875761b161668cb0de7ffbd

              SHA256

              efbf640d2c280d09e617809b9dc4c70a2383ee40a2f1fee8456296b8b38f78de

              SHA512

              5a612bcf062a8b3625fc8282cad6961a1909f1f4c3252647bf89e4c335b2d1660bb361fd0ed345bd91798eab0e5705daf9578cff78db0aa620417a8d9a2bf262

            • \Users\Admin\AppData\Local\Temp\nsoD4B.tmp\nsisunz.dll

              Filesize

              40KB

              MD5

              5f13dbc378792f23e598079fc1e4422b

              SHA1

              5813c05802f15930aa860b8363af2b58426c8adf

              SHA256

              6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

              SHA512

              9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5