Analysis

  • max time kernel
    300s
  • max time network
    304s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25-02-2024 11:12

General

  • Target

    ItroublveTSC.v6.Fix.7.2.rar

  • Size

    4.0MB

  • MD5

    aab9053283d8d5f452920edab39f49e6

  • SHA1

    5ff01a9da53e645865203a50de4ba158f5e38f3e

  • SHA256

    5dd724e42f13d33cd0c5fcd692988533b80635457e27c747ef2b489b42c84b99

  • SHA512

    454c952812befac25a4f55e2fe834fa8313381478b33a3c5281b1bc4a7eecd1877754005af24393adfa86b0d27830a940554cbafd87b5f5a8b86f3036c631716

  • SSDEEP

    98304:wLGXmhOW/Oeozvy8dptnsI9/JG7GWtV+0p5Yj2jKBe33mVrJaYpKktm:wLEmgET4vyetsI9/JhtVCG/Jp3A

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\ItroublveTSC.v6.Fix.7.2.rar
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\ItroublveTSC.v6.Fix.7.2.rar"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3760
      • C:\Users\Admin\AppData\Local\Temp\7zO0BE7F708\ItroublveTSC.exe
        "C:\Users\Admin\AppData\Local\Temp\7zO0BE7F708\ItroublveTSC.exe"
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:3664
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7zO0BE7F708\ItroublveTSC.exe

      Filesize

      3.9MB

      MD5

      53f43b1e9d99d6a356a332d9073b4736

      SHA1

      71e6c5a216a66b2b523b1b022d44c10b276c6195

      SHA256

      584bf67e7c8e93629e175733fe42907e60916047e68f1b4973d4cbf3dd2c22d6

      SHA512

      e7c5e4b26309e38dd1dd52b4f509c94fb9f50453e4d5c2ba895b02c48457a15c384866fdeb57185b628f10873ed6a6e6936ad170827f4855c9c5eca15ab8f959

    • memory/3664-13-0x0000000074CE0000-0x0000000075491000-memory.dmp

      Filesize

      7.7MB

    • memory/3664-12-0x00000000003A0000-0x0000000000786000-memory.dmp

      Filesize

      3.9MB

    • memory/3664-14-0x0000000005740000-0x0000000005CE6000-memory.dmp

      Filesize

      5.6MB

    • memory/3664-15-0x0000000005230000-0x00000000052C2000-memory.dmp

      Filesize

      584KB

    • memory/3664-16-0x00000000051D0000-0x00000000051E0000-memory.dmp

      Filesize

      64KB

    • memory/3664-17-0x00000000053F0000-0x00000000053FA000-memory.dmp

      Filesize

      40KB

    • memory/3664-18-0x00000000051D0000-0x00000000051E0000-memory.dmp

      Filesize

      64KB

    • memory/3664-19-0x0000000074CE0000-0x0000000075491000-memory.dmp

      Filesize

      7.7MB

    • memory/3664-20-0x00000000051D0000-0x00000000051E0000-memory.dmp

      Filesize

      64KB

    • memory/3664-21-0x00000000051D0000-0x00000000051E0000-memory.dmp

      Filesize

      64KB

    • memory/3664-22-0x0000000000EA0000-0x0000000000EAA000-memory.dmp

      Filesize

      40KB