Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-02-2024 18:00

General

  • Target

    a2662822eb64657633b06a15ab36d592.exe

  • Size

    17KB

  • MD5

    a2662822eb64657633b06a15ab36d592

  • SHA1

    3abbf482d7b5b28e969b1994447d17d30ef8b470

  • SHA256

    666a60eef65de8adcc326d7fd1a95e0984a50e281cd85bf2df232216aac5cfe5

  • SHA512

    f203ab74dbc91c7504acfd36b60281159fb6106d0f7509fe869b174c4ba81a98cbb108f359348d96c812dda731897b346c04e5b465312352803703ad899f083d

  • SSDEEP

    384:IqTfFGmEb6ec9Jqm+b42wCKt2Xe6w3z8XBcWaFzra8ypNWodXU:TUj8JNndAXGWa28ypN5l

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 7 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2662822eb64657633b06a15ab36d592.exe
    "C:\Users\Admin\AppData\Local\Temp\a2662822eb64657633b06a15ab36d592.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:116
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\mfxixue.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4768
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig
        3⤵
        • Gathers network information
        PID:4840
      • C:\Windows\Tasks\csrss.exe
        C:\Windows\Tasks\csrss.exe
        3⤵
        • Drops file in Drivers directory
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\drivers\etc\hosts

    Filesize

    884B

    MD5

    b75a3383b4197a5100367add2fc3195d

    SHA1

    a543ddb041c89ab95b72c28b6e16b203e7cf6e9c

    SHA256

    649cc16668f27c6ccbfbbabbc8c147710701437041f2326f3d568c4ea5a2c5ac

    SHA512

    f819eac15e13c31b160915d6a32c7eb8dec1c1fda409b4767e3f4c3cb63bbd0506da4a6486908491829f46d4ec5c0658f71fd76a24a22e50730ce8dbca48a5f8

  • C:\Windows\Tasks\csrss.exe

    Filesize

    17KB

    MD5

    7633e1cd548b40707f260b7b21a5eb69

    SHA1

    83fced324212dd4950afe96489bab44e7a642029

    SHA256

    4719404098faef757544b14f5749f5a8c6fa9c2098ce3deccfb54af5f4b8255d

    SHA512

    fd95bd9790493ea72284603ceef12d7f163c64b240b5d5a0b1ff380fc9221c7753631477aee1f987063bd919fbcf40ac9249de474a982e159aab26cca4eddd7c

  • C:\Windows\Tasks\hackshen.vbs

    Filesize

    97B

    MD5

    a8c57eab4925bb4ad48cbabba42746e0

    SHA1

    f9fa7820051d33dadb862777fffd9714517e086d

    SHA256

    bc37a3b40be7e73055684637731ac8514e7ec9a32fd470eb73c71fd8600dba51

    SHA512

    d03022e7dee4f2121c41fa4fc236147cc79dfd8006630e6cb3ac84b1f732015fc957dd27df94fc5e28bc144b932e297f783edf009cd2b55b9fd25529f07e0ec6

  • C:\odt\wsock32.dll

    Filesize

    6KB

    MD5

    d50cc09e37307d26ad4c2fce8957d0ed

    SHA1

    2d29ee8ecb2a24fba8fbcc9fd03fbda58b77b579

    SHA256

    0a2aca33c2c67afdbde6b75ce054f0f2b74d1de5c3e49a441c1577b4ee249948

    SHA512

    8bc7422ae3a93da838886e4917ab4d02f693066439bd0f7b1f95213fe658c9c6b272a0076b09adc2fef687eee28f300bbd1fd201e2a31914a353e16aa9d43de9

  • \??\c:\mfxixue.bat

    Filesize

    131B

    MD5

    02382ad87b13a804ff9011ed1171c9ec

    SHA1

    d0ac42b0c025bbe57cd70531c903964b788ee8bc

    SHA256

    2055499b4476ce892a5731e698852b40eddd26d4f15cce5fdc3c4f61fa77ce24

    SHA512

    67190a9b75f1c43757809ff799bb5c695cb693fd36fd20c515cd9912f18983dfddf9b6645ea4580c0dec559c2421acb188b4044dd62298231edef9280a28db68

  • memory/116-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/116-4-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2244-17-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2244-103-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2244-1058-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB