Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2024, 05:53

General

  • Target

    a30c3d76ef9ff4531cd7e3741bdd39d7.exe

  • Size

    1.3MB

  • MD5

    a30c3d76ef9ff4531cd7e3741bdd39d7

  • SHA1

    9cfb008e4cdac98aee126079c8db4d5cd32db70a

  • SHA256

    48158faf00e490f22c86f363b9cc7cf052d1f1edbaefd831de0d6a54b8751f4f

  • SHA512

    a7d6c9c5cf4583d16e748ff8f50058e1e8469eef943824343417651bccd40c8298cf052dec9fbea99f739faae908ca8799b4eef48fcb830e592a9c437d8ff7b9

  • SSDEEP

    24576:a7t1QobgnxVpDNhirSokjyuGoI2gLSpwcl6XO2Io9YQgyZPFddwPk8JAWB8lLVz:4t1+nVNfokjpGZuSA+YV4J8ZB8l5

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a30c3d76ef9ff4531cd7e3741bdd39d7.exe
    "C:\Users\Admin\AppData\Local\Temp\a30c3d76ef9ff4531cd7e3741bdd39d7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\ProgramData\uProxy Tool.exe
      "C:\ProgramData\uProxy Tool.exe"
      2⤵
      • Executes dropped EXE
      PID:2100
    • C:\ProgramData\svhost.exe
      "C:\ProgramData\svhost.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2672

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\svhost.exe

          Filesize

          22KB

          MD5

          bef0e3b32a57269864f4eb5a19c29c39

          SHA1

          fd365d15a1054f40614e62836e7dcdd9d38bf2df

          SHA256

          f097ecab05e184f1b400e982ff960f0cc13b617451b8e916399b461ecb81258a

          SHA512

          20d85c6084f7c31d8830adab140d08739af1e02de6727febbe6bcb0226758449621b737a00dfaf81c9f363c9a7e583e2277d295941ca933ac82d47084b08ff33

        • C:\ProgramData\uProxy Tool.exe

          Filesize

          1.3MB

          MD5

          d381c9079af8dc8e11f08fc1c4bb5d21

          SHA1

          a820039765ae3a743d61c7d582243a8b4f566f74

          SHA256

          8f781dad2cd705d6ba672cf6b50cbeb8029157f130ae5096fa0756484ac6722d

          SHA512

          1bd25a2ab94b4eb6743a2dd025cafc4043e64d8d163c54da166f85ced0650df52b6be981bcff4c0c76a867e631d96576c6a7b66e8c6373ea8b6c2f041ef0f4ac

        • memory/1648-14-0x000007FEF6210000-0x000007FEF6BFC000-memory.dmp

          Filesize

          9.9MB

        • memory/1648-1-0x000007FEF6210000-0x000007FEF6BFC000-memory.dmp

          Filesize

          9.9MB

        • memory/1648-0-0x0000000000030000-0x000000000018E000-memory.dmp

          Filesize

          1.4MB

        • memory/2100-9-0x000007FEF6210000-0x000007FEF6BFC000-memory.dmp

          Filesize

          9.9MB

        • memory/2100-10-0x00000000012E0000-0x000000000142E000-memory.dmp

          Filesize

          1.3MB

        • memory/2100-17-0x000000001B170000-0x000000001B1F0000-memory.dmp

          Filesize

          512KB

        • memory/2100-18-0x0000000000C70000-0x0000000000CEC000-memory.dmp

          Filesize

          496KB

        • memory/2100-19-0x000007FEF6210000-0x000007FEF6BFC000-memory.dmp

          Filesize

          9.9MB

        • memory/2672-15-0x000007FEF6210000-0x000007FEF6BFC000-memory.dmp

          Filesize

          9.9MB

        • memory/2672-16-0x0000000000850000-0x000000000085C000-memory.dmp

          Filesize

          48KB

        • memory/2672-21-0x000007FEF6210000-0x000007FEF6BFC000-memory.dmp

          Filesize

          9.9MB

        • memory/2672-22-0x000000001B300000-0x000000001B380000-memory.dmp

          Filesize

          512KB