Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 03:13

General

  • Target

    b381c7c9b23a2dba55aa561e2cd4331a.exe

  • Size

    204KB

  • MD5

    b381c7c9b23a2dba55aa561e2cd4331a

  • SHA1

    3c46281195ebd99b5a71cac20bc61c74a5541be5

  • SHA256

    b133044ab849f7e29d6ca958bc8393345da35514af65d894ccef4323150408e6

  • SHA512

    9af446c09d3691a2ce266b2b2f708a542a65c36ac2296f5c742d488fefe6a399cd3eead0f538743638d399997226eb4ba0367a992acca7e7eabd8348c9ab2504

  • SSDEEP

    1536:1EGh0oul15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oul1OPOe2MUVg3Ve+rXfMUy

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b381c7c9b23a2dba55aa561e2cd4331a.exe
    "C:\Users\Admin\AppData\Local\Temp\b381c7c9b23a2dba55aa561e2cd4331a.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Windows\{EB8E0581-8817-4b74-831F-9D67B403C421}.exe
      C:\Windows\{EB8E0581-8817-4b74-831F-9D67B403C421}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\{1A30103F-F056-4e41-B8D1-054D9B8BEE28}.exe
        C:\Windows\{1A30103F-F056-4e41-B8D1-054D9B8BEE28}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1776
        • C:\Windows\{140A07E8-8768-4ff6-9AF3-54E7DB1DDC12}.exe
          C:\Windows\{140A07E8-8768-4ff6-9AF3-54E7DB1DDC12}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2460
          • C:\Windows\{86DEBF03-207D-473d-8FA6-B29ABA8376CC}.exe
            C:\Windows\{86DEBF03-207D-473d-8FA6-B29ABA8376CC}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2476
            • C:\Windows\{E3DFC0E6-0A60-42bb-B476-028D4033F2B2}.exe
              C:\Windows\{E3DFC0E6-0A60-42bb-B476-028D4033F2B2}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1720
              • C:\Windows\{E7D168A3-5543-4702-823D-FC6E9B088D06}.exe
                C:\Windows\{E7D168A3-5543-4702-823D-FC6E9B088D06}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2624
                • C:\Windows\{8E33C9A1-D18B-497e-BC73-F1BDE533D82C}.exe
                  C:\Windows\{8E33C9A1-D18B-497e-BC73-F1BDE533D82C}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:524
                  • C:\Windows\{3525AC3D-60EE-47d1-9B15-5592AF18A349}.exe
                    C:\Windows\{3525AC3D-60EE-47d1-9B15-5592AF18A349}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1504
                    • C:\Windows\{625D2070-C5BD-4097-B8C2-E5821D0A2D3F}.exe
                      C:\Windows\{625D2070-C5BD-4097-B8C2-E5821D0A2D3F}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1552
                      • C:\Windows\{89F050D6-456E-4742-A810-52FC9977D936}.exe
                        C:\Windows\{89F050D6-456E-4742-A810-52FC9977D936}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2616
                        • C:\Windows\{DE21D23C-18A6-4695-9151-142C7124051C}.exe
                          C:\Windows\{DE21D23C-18A6-4695-9151-142C7124051C}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          PID:2248
                          • C:\Windows\{EC4B244A-FFCA-4cf2-8B3D-C37A98702C18}.exe
                            C:\Windows\{EC4B244A-FFCA-4cf2-8B3D-C37A98702C18}.exe
                            13⤵
                              PID:2088
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{DE21D~1.EXE > nul
                              13⤵
                                PID:2612
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{89F05~1.EXE > nul
                              12⤵
                                PID:344
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{625D2~1.EXE > nul
                              11⤵
                                PID:2060
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{3525A~1.EXE > nul
                              10⤵
                                PID:1256
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{8E33C~1.EXE > nul
                              9⤵
                                PID:2812
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{E7D16~1.EXE > nul
                              8⤵
                                PID:528
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{E3DFC~1.EXE > nul
                              7⤵
                                PID:364
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{86DEB~1.EXE > nul
                              6⤵
                                PID:2708
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{140A0~1.EXE > nul
                              5⤵
                                PID:1652
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{1A301~1.EXE > nul
                              4⤵
                                PID:2684
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{EB8E0~1.EXE > nul
                              3⤵
                                PID:2652
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\B381C7~1.EXE > nul
                              2⤵
                              • Deletes itself
                              PID:3000

                          Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Windows\{140A07E8-8768-4ff6-9AF3-54E7DB1DDC12}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  8ef882b5cd6415ef6c64e329bee382ba

                                  SHA1

                                  966abbd0e1d61cfd1fbc5be43bb16c9953dabb25

                                  SHA256

                                  861f9ac7c2f15ab1b3350e8a4588a0293465ffb42b14232e1a0ef3cfff4d4827

                                  SHA512

                                  d4e9e0e05533ba22088e30771bbf96cfd8bac48cedfdf0bd4c7ca716d501c7bfb0f3a3f0e3b372e92f9b9e59f0dac2397b093a8f7096a6993a3fb161803e7302

                                • C:\Windows\{1A30103F-F056-4e41-B8D1-054D9B8BEE28}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  4441676db00c43c3089aedca754d0270

                                  SHA1

                                  ed9dcdd603ee012f6e43198b6e9d39c15fc6e4cd

                                  SHA256

                                  4b6c58b9b71c74051284870d4db714792424acc76b4550577e421c5d95e804d8

                                  SHA512

                                  e75afa96138025e44195b8785c4a38729541878632d1c5d34238b5010174cc4ecf2954a0a838b78d4479574e5660953e0f5a71386789f73470e9ffafbcd0efba

                                • C:\Windows\{3525AC3D-60EE-47d1-9B15-5592AF18A349}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  3f0bc3a7a8cdadf8616ed825bff11cf4

                                  SHA1

                                  734dd292dde7a433b4eb1ee46f90833ea703cf6c

                                  SHA256

                                  375b1ca032fa906dc71c2295decd84f93d93f8b2cb99e67a280fc89eee2c888d

                                  SHA512

                                  bb45996a2289eaeaa84bf6f24020e9d415e784c7ca14aa191acfd89974bb49b6cf61003215a0e87ccfa1f3c4843f27a3324cf6b81068f33f36099396781c1305

                                • C:\Windows\{625D2070-C5BD-4097-B8C2-E5821D0A2D3F}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  ada313117e13dd9fe54159483c4bfb49

                                  SHA1

                                  a97443e2ac9ed04ca70cc06b390be59bb165f372

                                  SHA256

                                  324962b7baf7210c8e3a057acea3247ae8d80db20dcbc172e91e3949b58522b4

                                  SHA512

                                  3ba4aa2278e73f187de856a93561e7488de96dfdf41a22cd7184accc6e654af65fa956a3eb32df8a9b1393929dc142b9c5d4cf3cb97773eb0416947648caba13

                                • C:\Windows\{86DEBF03-207D-473d-8FA6-B29ABA8376CC}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  218a9fc49e987f9add7febfcf4b48fa9

                                  SHA1

                                  8685c02e06dc05b2c2b04282993d16f878423791

                                  SHA256

                                  caa43e54ba1d2e2c127d216632e2c11e2d54a45678b8baf32c0ec7a2f4f0cf27

                                  SHA512

                                  7b5ddf271be98836b2989f3f30eee991ab79c074df908547a3dd3304459c2b05c3c7e3b9edd45f537d20755ebc4344ca076647461081465779f586932d261eb1

                                • C:\Windows\{89F050D6-456E-4742-A810-52FC9977D936}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  f2cb6e01f160e2b2cba6c3ed40b37a83

                                  SHA1

                                  d3100a8fefdaf8558b22d24d92eac8dce6ddb214

                                  SHA256

                                  c419b840e306bfb053759fb7a56eeecfe8f0f37c62622e42a73f8a73acf018fb

                                  SHA512

                                  2c8220a4ecaca54b4fe5b64f16dcadbdeff0a8be69f82dbb662dfe6ec27479542ddabc32341c2c16996e04f3fd6d5089ba4f67d477ecf5e7f9fbc5b659c9f382

                                • C:\Windows\{8E33C9A1-D18B-497e-BC73-F1BDE533D82C}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  9c46c6481bcf79e6f608976909a87abc

                                  SHA1

                                  bc9626be2ca73120a6a353a8ddbff38fbe1638a4

                                  SHA256

                                  c64128078585e9d36ceeab9721afaf21911b43b01190f71fa91ec26e3c7b8f74

                                  SHA512

                                  e64102cf867e697a144f13d2926f78f8a0d71f3e68f19ea334de30d00145070dd1b944147a4e049a94311c4d1a02f34a9a7db265d128740f0f7e3c16035ee3a8

                                • C:\Windows\{DE21D23C-18A6-4695-9151-142C7124051C}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  9cf30b6dccdb03c26d965661c4001b1f

                                  SHA1

                                  113522ed73446eaa0344f89fe5e82e8c2fdab20a

                                  SHA256

                                  b53f368119dc3fe2019bdb7929f3796b78bfe5bdfc242b4c1486910cf47f599c

                                  SHA512

                                  7841cbdb8e65218a10018b328d3c203e92174634554db9fccc87f2a7b6407be0118248c8c3a8c4d6dfc752910bf9b0b94d3b9c13f35b7bdef39c2cf27c0c0cfe

                                • C:\Windows\{E3DFC0E6-0A60-42bb-B476-028D4033F2B2}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  98194840be0fc63b8f5f761aea073e17

                                  SHA1

                                  88f0a5da281fe4eb8d428c612ea8788826732bef

                                  SHA256

                                  59b6dfbfe6715ab5812e9a39ac207036fccc28ae7bcd1423699abf0bbcbcbc54

                                  SHA512

                                  9f969dcb3d635d2a68c2747184360c283cfd14369da978009c30f317af9ae4da67deec949da70c1a41b6eb8e66b9facbadc55326ce647a9cb640e50ef5074b42

                                • C:\Windows\{E7D168A3-5543-4702-823D-FC6E9B088D06}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  6fe03cf9a36f009af4c141be3093aea9

                                  SHA1

                                  180658eb6c59817c5484b30c1dd0677b48bb9e4d

                                  SHA256

                                  70cec224632c3123e7fca5f9ace24590d7452423adac59d17a130f006d976ce1

                                  SHA512

                                  3257531915500186507e1103b62d447411a436468b454e626674bf968f5064401bd617c1b1baad0b99519a7df2dc8691d42f1aaa40a4beb748a2566eaa2eeadb

                                • C:\Windows\{EB8E0581-8817-4b74-831F-9D67B403C421}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  5a396b6ab8d41f22eabf5b0edc6583b3

                                  SHA1

                                  b601facaeaf7069ecd9226b164931f8673ff6d86

                                  SHA256

                                  163ece920cdf75e2add287b601e8d35b9295768a1eb7bf8c6d222afa044b9b0d

                                  SHA512

                                  8a89d006bec06c57a50335928cf231575227abdba1ee7c51ceb3978c55b210b981fa90cb79491d5a6204436d6e21c2b628eececb39790514526c7fd74715cce7

                                • C:\Windows\{EC4B244A-FFCA-4cf2-8B3D-C37A98702C18}.exe

                                  Filesize

                                  204KB

                                  MD5

                                  a3bd2fee203b415436d90501741a77a8

                                  SHA1

                                  1e86774bdb64498ed746dcbd74be91d84f237339

                                  SHA256

                                  30cdbb83996621700f31ce465dd83b9baf438786ce4ee459547313dab60ea48a

                                  SHA512

                                  2e7af1bf968d050d4cb0069b135267dd85383ca46266ebcb5bcd832e1dbbf22f592204d7a0083944bbb8ce145c14c5600815374d35ad6b2ca8f8dbd4e59a5954