Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 15:28

General

  • Target

    b7be221d96dddd3ca71f41bb0c268b12.exe

  • Size

    27KB

  • MD5

    b7be221d96dddd3ca71f41bb0c268b12

  • SHA1

    5829f0b4a7cc162dce361d60314b39ee6cbaea22

  • SHA256

    5a2b97d8ded2fc70a3cc4c767a4e4e44337e2e0ef1440c1608dda3f87d436f06

  • SHA512

    8ce7b791b71f0b4c6cc5245da9a6c428d8ff0328fe662415dec2d5daa7dac1cc88d57fb397cc4ba73ea97d88758c1049ad8ef8b0c14ee27cf7479a1defc37d77

  • SSDEEP

    768:LrXJcX8W8qBQEF/kRRJsnhjQcBwsJvNs5gxxTOiR:LrXS1iAEunhQcZsyxS6

Score
8/10

Malware Config

Signatures

  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7be221d96dddd3ca71f41bb0c268b12.exe
    "C:\Users\Admin\AppData\Local\Temp\b7be221d96dddd3ca71f41bb0c268b12.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Windows\Fonts\6d9f33f42e574309ce13d687b4ea1d79\system\clfmon.exe
      C:\Windows\Fonts\6d9f33f42e574309ce13d687b4ea1d79\system\clfmon.exe
      2⤵
      • Sets file execution options in registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies Control Panel
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:3508
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\b7be221d96dddd3ca71f41bb0c268b12.exe.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3876
      • C:\Windows\SysWOW64\attrib.exe
        attrib -s -h -a "C:\Users\Admin\AppData\Local\Temp\b7be221d96dddd3ca71f41bb0c268b12.exe"
        3⤵
        • Views/modifies file attributes
        PID:2308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\b7be221d96dddd3ca71f41bb0c268b12.exe.bat

    Filesize

    348B

    MD5

    e3c3aff310f0a1c1a6fc7f3b8e9d289a

    SHA1

    f3fa996936581c1698903d299e9032f258487d29

    SHA256

    9227658cda01d42780d343b1b9d215c81fa8bf451a7f0c96026c03f36a9577cb

    SHA512

    1809ed2dc03d98d51eaf5005e52f4d9546f8310247d4b4af95c1fec9f80a991e96fe1e672b672024a3e33e671785e71082209d7a5c04a8d48a3f69faaffe6830

  • C:\Windows\Fonts\6d9f33f42e574309ce13d687b4ea1d79\system\clfmon.exe

    Filesize

    27KB

    MD5

    b7be221d96dddd3ca71f41bb0c268b12

    SHA1

    5829f0b4a7cc162dce361d60314b39ee6cbaea22

    SHA256

    5a2b97d8ded2fc70a3cc4c767a4e4e44337e2e0ef1440c1608dda3f87d436f06

    SHA512

    8ce7b791b71f0b4c6cc5245da9a6c428d8ff0328fe662415dec2d5daa7dac1cc88d57fb397cc4ba73ea97d88758c1049ad8ef8b0c14ee27cf7479a1defc37d77