Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 18:00

General

  • Target

    a2662822eb64657633b06a15ab36d592.exe

  • Size

    17KB

  • MD5

    a2662822eb64657633b06a15ab36d592

  • SHA1

    3abbf482d7b5b28e969b1994447d17d30ef8b470

  • SHA256

    666a60eef65de8adcc326d7fd1a95e0984a50e281cd85bf2df232216aac5cfe5

  • SHA512

    f203ab74dbc91c7504acfd36b60281159fb6106d0f7509fe869b174c4ba81a98cbb108f359348d96c812dda731897b346c04e5b465312352803703ad899f083d

  • SSDEEP

    384:IqTfFGmEb6ec9Jqm+b42wCKt2Xe6w3z8XBcWaFzra8ypNWodXU:TUj8JNndAXGWa28ypN5l

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 3 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 7 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2662822eb64657633b06a15ab36d592.exe
    "C:\Users\Admin\AppData\Local\Temp\a2662822eb64657633b06a15ab36d592.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\mfxixue.bat
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        3⤵
        • Gathers network information
        PID:2740
      • C:\Windows\Tasks\csrss.exe
        C:\Windows\Tasks\csrss.exe
        3⤵
        • Drops file in Drivers directory
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        PID:2540

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\System32\drivers\etc\hosts

          Filesize

          884B

          MD5

          b75a3383b4197a5100367add2fc3195d

          SHA1

          a543ddb041c89ab95b72c28b6e16b203e7cf6e9c

          SHA256

          649cc16668f27c6ccbfbbabbc8c147710701437041f2326f3d568c4ea5a2c5ac

          SHA512

          f819eac15e13c31b160915d6a32c7eb8dec1c1fda409b4767e3f4c3cb63bbd0506da4a6486908491829f46d4ec5c0658f71fd76a24a22e50730ce8dbca48a5f8

        • C:\Windows\Tasks\csrss.exe

          Filesize

          17KB

          MD5

          7633e1cd548b40707f260b7b21a5eb69

          SHA1

          83fced324212dd4950afe96489bab44e7a642029

          SHA256

          4719404098faef757544b14f5749f5a8c6fa9c2098ce3deccfb54af5f4b8255d

          SHA512

          fd95bd9790493ea72284603ceef12d7f163c64b240b5d5a0b1ff380fc9221c7753631477aee1f987063bd919fbcf40ac9249de474a982e159aab26cca4eddd7c

        • C:\Windows\Tasks\hackshen.vbs

          Filesize

          97B

          MD5

          a8c57eab4925bb4ad48cbabba42746e0

          SHA1

          f9fa7820051d33dadb862777fffd9714517e086d

          SHA256

          bc37a3b40be7e73055684637731ac8514e7ec9a32fd470eb73c71fd8600dba51

          SHA512

          d03022e7dee4f2121c41fa4fc236147cc79dfd8006630e6cb3ac84b1f732015fc957dd27df94fc5e28bc144b932e297f783edf009cd2b55b9fd25529f07e0ec6

        • C:\Windows\Tasks\wsock32.dll

          Filesize

          6KB

          MD5

          d50cc09e37307d26ad4c2fce8957d0ed

          SHA1

          2d29ee8ecb2a24fba8fbcc9fd03fbda58b77b579

          SHA256

          0a2aca33c2c67afdbde6b75ce054f0f2b74d1de5c3e49a441c1577b4ee249948

          SHA512

          8bc7422ae3a93da838886e4917ab4d02f693066439bd0f7b1f95213fe658c9c6b272a0076b09adc2fef687eee28f300bbd1fd201e2a31914a353e16aa9d43de9

        • C:\mfxixue.bat

          Filesize

          131B

          MD5

          02382ad87b13a804ff9011ed1171c9ec

          SHA1

          d0ac42b0c025bbe57cd70531c903964b788ee8bc

          SHA256

          2055499b4476ce892a5731e698852b40eddd26d4f15cce5fdc3c4f61fa77ce24

          SHA512

          67190a9b75f1c43757809ff799bb5c695cb693fd36fd20c515cd9912f18983dfddf9b6645ea4580c0dec559c2421acb188b4044dd62298231edef9280a28db68

        • memory/2384-0-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/2384-9-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/2540-24-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/2540-98-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/2540-897-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/2960-14-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB