Resubmissions

25/02/2024, 04:58

240225-flvy1scg6z 10

23/02/2024, 22:16

240223-165zyaab42 10

23/02/2024, 14:27

240223-rsk8yaba65 10

Analysis

  • max time kernel
    234s
  • max time network
    233s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    23/02/2024, 14:27

General

  • Target

    NOT A VIRUS.exe

  • Size

    214KB

  • MD5

    e431cae2c2e7c1d50e2264102d898310

  • SHA1

    7eae6955815fda22dd9ed02302d5f0ca4596854f

  • SHA256

    ff86000c39c061650d004894837d8f618d0724ce3b2a2ef24072c784b2ceb67f

  • SHA512

    74be155fefe642006b7df93aeef53ba34cb950d6172d40782de768ef7437061491b63e7950ef1038d8dbec70e60fa900ce212fd804fb9cb555f337176d99cb1c

  • SSDEEP

    6144:4hQ9z8vM92B+64kQ2EJam2dNREz9FdOZMJwGuE4QyZom8exsrPR5TE7D0XuDTTo6:4hDs2B+64kQHam2dNREz9FdOZMJwGuEu

Score
7/10

Malware Config

Signatures

  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NOT A VIRUS.exe
    "C:\Users\Admin\AppData\Local\Temp\NOT A VIRUS.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /IM wscript.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1868
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /IM cmd.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\eaotnakqxu.gif

    Filesize

    297KB

    MD5

    c29a3be5142c2304ec7b8a6d8a4fe0f1

    SHA1

    2df712ce87e022d9c69e3bc9f4e17822840715f0

    SHA256

    8d070d9c04be926f34064e585edc84c8837bc4476eacde6b046e855d213f48fc

    SHA512

    62166c06c7e340d779670a75654fe4538133d1f0022a9ae4869192375ca6133802c006fabe0f67d1c7f155a13d6e28f70a3f9c199927ad628227e744d454728b

  • C:\Users\Admin\AppData\Local\Temp\ohznxqongm.gif

    Filesize

    305KB

    MD5

    44290f48408be4840de97bed814fe8df

    SHA1

    8bfe3baad8cd4fbb6b3a1374a3b1f6123f42706c

    SHA256

    57f082caa1766e60c46f69300475be4e6dee3e0330ff329e3ceec3d5bce69dda

    SHA512

    3139d77e9e626a45cd7faea5d5fcdfb7d7758b4a940e31e593bc9bceb999426418cfc690c2568776e659abfaf2733e96813470b21838e0a6c0740c07073aeb2e

  • C:\Users\Admin\AppData\Local\Temp\xavtyujlxh.gif

    Filesize

    241KB

    MD5

    5a7b5ec0c06f5cbe1e04dbf070c510fb

    SHA1

    8376a1e841035cec698bc1711672e7dba79aaf87

    SHA256

    b4bc127b5d66ab018235635fc12fe65d6ce97f9f8350e965213d9dca9264da45

    SHA512

    336f830d2ebe82ed782f1a9881a87f2726ef33e26a1659875ca346c8c8b325ec65cbb55ad8fcaaeb5da58865bb79a2d03192cb0fe75fe9be77da41b2537df2df

  • C:\Users\Admin\AppData\Local\Temp\ztgfkpfuns.gif

    Filesize

    422KB

    MD5

    705a10144ffd51597b863af7b6dc6761

    SHA1

    68e3ff4a0c5c498e958431cc4379f33042900194

    SHA256

    cbc8a31345ac302681cac85e5347de1ffcbaa12bdc50c679ecf99cda7fc5157e

    SHA512

    00685116a9471c2f95534932eedf29e70c0486cdb16235770ff3ab8655396ead19378c29f57f298ac2d17e202ed8e75b4ecab282a1be4cb40dd27774568107a3

  • memory/1888-8-0x00000000748E0000-0x0000000074E8B000-memory.dmp

    Filesize

    5.7MB

  • memory/1888-10-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB

  • memory/1888-11-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB

  • memory/1888-12-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB

  • memory/1888-9-0x00000000748E0000-0x0000000074E8B000-memory.dmp

    Filesize

    5.7MB

  • memory/1888-1-0x00000000748E0000-0x0000000074E8B000-memory.dmp

    Filesize

    5.7MB

  • memory/1888-2-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB

  • memory/1888-0-0x00000000748E0000-0x0000000074E8B000-memory.dmp

    Filesize

    5.7MB

  • memory/1888-45-0x0000000000220000-0x0000000000260000-memory.dmp

    Filesize

    256KB