Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 08:13

General

  • Target

    98eb8f406496988aa8ab1aec8523fef5.exe

  • Size

    484KB

  • MD5

    98eb8f406496988aa8ab1aec8523fef5

  • SHA1

    829045033566491c1b529182904b4ec80590dc43

  • SHA256

    481350cbfc53ab6da8003e78af04c1c7a28f1640bcf5e09e3e9b4991e6bf9afe

  • SHA512

    dc2764b3be7faa6badb1fcc51bc798308a1c15d5693d73a21167ff089ae088dac8ba6d060930691cca09318c8851875ab78292826cdcd04cf9ca9b68e48ef170

  • SSDEEP

    12288:BLPkCDt1EG2XVekhdeTNpRx+gyq3Zg3gaAllkCi2Nnofi:BLPkQ1bqAlpmgyEKBMlkr2Nn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:3520
    • C:\Users\Admin\AppData\Local\Temp\98eb8f406496988aa8ab1aec8523fef5.exe
      "C:\Users\Admin\AppData\Local\Temp\98eb8f406496988aa8ab1aec8523fef5.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Users\Admin\AppData\Roaming\appist3g\ddodHost.exe
        "C:\Users\Admin\AppData\Roaming\appist3g"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Users\Admin\AppData\Local\Temp\~83A7.tmp
          3520 495624 1832 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3640
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 636
        3⤵
        • Program crash
        PID:4964
  • C:\Windows\SysWOW64\AtBrcurl.exe
    C:\Windows\SysWOW64\AtBrcurl.exe -s
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    PID:3876
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2124 -ip 2124
    1⤵
      PID:368

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~83A7.tmp

      Filesize

      8KB

      MD5

      aac3165ece2959f39ff98334618d10d9

      SHA1

      020a191bfdc70c1fbd3bf74cd7479258bd197f51

      SHA256

      96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974

      SHA512

      9eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf

    • C:\Users\Admin\AppData\Roaming\appist3g\ddodHost.exe

      Filesize

      484KB

      MD5

      8283b0aa9acb196e16cc94fdbb6ecae8

      SHA1

      6ed876a97711b76c795b370a47c9d19ea69fa957

      SHA256

      5bd46c7ad6ea20a670167334e730b2f80ff51c150533fae3730c976283cb5d87

      SHA512

      cd94cade8c22b5d4cdacf71e6c060e62070dccc3ebeaf26c04319eb7b33c457d6a5e217904897a2a6078cecf681f024eaace4e035dac7b90ba5f9b24d8826578

    • memory/1832-8-0x0000000000FD0000-0x0000000001053000-memory.dmp

      Filesize

      524KB

    • memory/1832-13-0x00000000013D0000-0x00000000013D6000-memory.dmp

      Filesize

      24KB

    • memory/2124-0-0x00000000005C0000-0x0000000000643000-memory.dmp

      Filesize

      524KB

    • memory/2124-26-0x00000000005C0000-0x0000000000643000-memory.dmp

      Filesize

      524KB

    • memory/3520-22-0x0000000003270000-0x0000000003276000-memory.dmp

      Filesize

      24KB

    • memory/3520-23-0x00000000032E0000-0x00000000032ED000-memory.dmp

      Filesize

      52KB

    • memory/3520-16-0x0000000008940000-0x00000000089C9000-memory.dmp

      Filesize

      548KB

    • memory/3520-19-0x0000000008940000-0x00000000089C9000-memory.dmp

      Filesize

      548KB

    • memory/3876-18-0x0000000001100000-0x0000000001183000-memory.dmp

      Filesize

      524KB

    • memory/3876-11-0x00000000012A0000-0x00000000012A6000-memory.dmp

      Filesize

      24KB

    • memory/3876-17-0x0000000001290000-0x0000000001296000-memory.dmp

      Filesize

      24KB

    • memory/3876-9-0x0000000001290000-0x0000000001296000-memory.dmp

      Filesize

      24KB

    • memory/3876-27-0x0000000001290000-0x0000000001296000-memory.dmp

      Filesize

      24KB