Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/02/2024, 05:17

General

  • Target

    15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe

  • Size

    751KB

  • MD5

    8a7ea7ff5e5cce2ca107a23aeb40b4e3

  • SHA1

    0fe3cc81e2d4f294d80a8428783a72eb8cd82c6e

  • SHA256

    15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef

  • SHA512

    37d3e30a2f82484ece8040ac334369bad247b0cbb7c0326f31b046e2f5203823e4ba7c962b1cf2431fa357f07c1e53fff5848aaa88241a8e623d89637d427ab7

  • SSDEEP

    12288:C8S+oGOKcbWAL9bW9ezgqZDKogif+UPJsXf4vIUeVfvGMbvk1RsXS38Mc14hhjwd:RAL9iyga+ogimUmXgRnMY1RRg8hcH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe
    "C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1612
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WEvGPrV.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1668
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WEvGPrV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp89E8.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1160
    • C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe
      "C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"
      2⤵
        PID:2004
      • C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe
        "C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"
        2⤵
          PID:872
        • C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe
          "C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"
          2⤵
            PID:572
          • C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe
            "C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"
            2⤵
              PID:596
            • C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe
              "C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"
              2⤵
                PID:704

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\tmp89E8.tmp

              Filesize

              1KB

              MD5

              ea4ee16e41ad03c5be9d99033b60d101

              SHA1

              30fa0c1155c02b53d44dcbbe865e150dd7eff1b6

              SHA256

              34e6ccbd838b5ba3263696dc33c3c7d2f500e3a966bbc32020015d6a9ae5307f

              SHA512

              79fb10575cd97ce3455d0e66b645fe37722c54cce31a04853ff25a5e9772fb198e4e005aeb60f33790c7fa1b27d2ad115c5a7023f816f8b3f178a3d00d1d7ef6

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CVUF2FHUEZU1OFSLJC1T.temp

              Filesize

              7KB

              MD5

              a5326d944fa44a487197587740e55c60

              SHA1

              17769098b48baef005c296690aefb4d50e21ffa4

              SHA256

              1da955b9e2cf58e4292806e83df6a48fd3a7dcb6cd101ce7e789b54556db29cb

              SHA512

              79be20e77938a19edaba5e6999b32d5d51f4aadce2f6e1b134a5f2e3ae2ea3d51e65a9b91f045cd40a752ae385ce436ce0166be896c7d202e2485769f70ba4a0

            • memory/1612-27-0x0000000001D10000-0x0000000001D50000-memory.dmp

              Filesize

              256KB

            • memory/1612-29-0x000000006F640000-0x000000006FBEB000-memory.dmp

              Filesize

              5.7MB

            • memory/1612-26-0x0000000001D10000-0x0000000001D50000-memory.dmp

              Filesize

              256KB

            • memory/1612-25-0x0000000001D10000-0x0000000001D50000-memory.dmp

              Filesize

              256KB

            • memory/1612-23-0x000000006F640000-0x000000006FBEB000-memory.dmp

              Filesize

              5.7MB

            • memory/1612-20-0x000000006F640000-0x000000006FBEB000-memory.dmp

              Filesize

              5.7MB

            • memory/1668-22-0x0000000002630000-0x0000000002670000-memory.dmp

              Filesize

              256KB

            • memory/1668-28-0x000000006F640000-0x000000006FBEB000-memory.dmp

              Filesize

              5.7MB

            • memory/1668-24-0x000000006F640000-0x000000006FBEB000-memory.dmp

              Filesize

              5.7MB

            • memory/1668-21-0x000000006F640000-0x000000006FBEB000-memory.dmp

              Filesize

              5.7MB

            • memory/2236-2-0x0000000004940000-0x0000000004980000-memory.dmp

              Filesize

              256KB

            • memory/2236-19-0x0000000074ED0000-0x00000000755BE000-memory.dmp

              Filesize

              6.9MB

            • memory/2236-1-0x0000000074ED0000-0x00000000755BE000-memory.dmp

              Filesize

              6.9MB

            • memory/2236-0-0x0000000000360000-0x0000000000422000-memory.dmp

              Filesize

              776KB

            • memory/2236-3-0x00000000005E0000-0x00000000005FC000-memory.dmp

              Filesize

              112KB

            • memory/2236-6-0x0000000005080000-0x0000000005102000-memory.dmp

              Filesize

              520KB

            • memory/2236-5-0x0000000000840000-0x0000000000852000-memory.dmp

              Filesize

              72KB

            • memory/2236-4-0x0000000000830000-0x000000000083C000-memory.dmp

              Filesize

              48KB