Analysis

  • max time kernel
    296s
  • max time network
    274s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/02/2024, 14:17

General

  • Target

    85ec36e3d25cad7c455ef48ee613acdb732476a8e6b690c3b1850844f83680ef.exe

  • Size

    1.0MB

  • MD5

    f00dcb903268d40952f112f1e5e3e92b

  • SHA1

    faca7d57ece3cad3015139640ef27ba7400b482e

  • SHA256

    85ec36e3d25cad7c455ef48ee613acdb732476a8e6b690c3b1850844f83680ef

  • SHA512

    0aacf32e2684e9949f07c1bb49c8379bafa035b86824c0398861a38820f92d806c9bf8d36930662f4ba0848df304af3ebbb688f387f7e2546d1843e0882d4082

  • SSDEEP

    6144:clkgi0e+Kqj6aYD+uUOszAOLjLlP+r0UPdWv:JCe+Kqv0szvfU1Q

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 8 IoCs
  • Loads dropped DLL 2 IoCs
  • Registers COM server for autorun 1 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85ec36e3d25cad7c455ef48ee613acdb732476a8e6b690c3b1850844f83680ef.exe
    "C:\Users\Admin\AppData\Local\Temp\85ec36e3d25cad7c455ef48ee613acdb732476a8e6b690c3b1850844f83680ef.exe"
    1⤵
    • Registers COM server for autorun
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:924
    • C:\Windows\SysWOW64\cleanmgr.exe
      "C:\Windows\SysWOW64\cleanmgr.exe" /verylowdisk
      2⤵
      • Loads dropped DLL
      • Registers COM server for autorun
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:424
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\CleanUp.dll,DiskCleaner
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Registers COM server for autorun
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:4528
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\85ec36e3d25cad7c455ef48ee613acdb732476a8e6b690c3b1850844f83680ef.exe > nul
      2⤵
        PID:1284

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CleanUp.dll

      Filesize

      736KB

      MD5

      cc08609b2a7d80e3b15e9d132ad9cc8b

      SHA1

      060ab8f7f4309bac7a0404aa84a4dd213b9733dd

      SHA256

      b1228c370d6c3e02c7adc0c0bbacb0ab20f23ebadb8625404592277fdabdc6c8

      SHA512

      13039a7ba22ebb75605c2c4d6706fc2e443d8a5e652a14d109b3bde38e84fc0e8dfeeb7d569f3e1240bb559903d02c32e37fcdaf329615d928a2f32d6ed013d1

    • memory/424-4-0x00000000045E0000-0x00000000045E1000-memory.dmp

      Filesize

      4KB

    • memory/424-5-0x0000000010000000-0x0000000010079000-memory.dmp

      Filesize

      484KB

    • memory/424-16-0x0000000004B90000-0x0000000004BA3000-memory.dmp

      Filesize

      76KB

    • memory/4528-17-0x00000000023C0000-0x00000000023D3000-memory.dmp

      Filesize

      76KB