Analysis

  • max time kernel
    49s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7-20240221-ja
  • resource tags

    arch:x64arch:x86image:win7-20240221-jalocale:ja-jpos:windows7-x64systemwindows
  • submitted
    07/03/2024, 17:19

General

  • Target

    Serb.exe

  • Size

    3.9MB

  • MD5

    a4cd81c294c112fd82a4abcb2b6bebf0

  • SHA1

    9143dce76ecb158ac50fc328f6ebad23bc762b21

  • SHA256

    eb698e6735684fb5a87fe9cc8af2853e921efb80e91211207f85c2ecde960513

  • SHA512

    6802e4e8ad8fb7f943cca9cac1c25813104db4de624023f4dd5b8f9d2c1dc1689b41de42dc2856cfe83d9ce3e68183ee4e6c7ba553abafef8a9aac7211904dbc

  • SSDEEP

    98304:emY+C/pcz/FOXnkWYfLj18kH5PS5LPstLlgLJBHe2PU:emY+2pcyk1GaPS5jQLlaJU2PU

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Serb.exe
    "C:\Users\Admin\AppData\Local\Temp\Serb.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe
      "C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe" "SFXSOURCE:C:\Users\Admin\AppData\Local\Temp\Serb.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Docs\B.exe
        C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Docs\B.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Windows\system32\cmd.exe
          "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\7272.tmp\7273.tmp\7274.bat C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Docs\B.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2408
          • C:\Windows\system32\msg.exe
            msg * Error bad Gateway at {103} At Setup.exe
            5⤵
              PID:1948
            • C:\Windows\system32\timeout.exe
              timeout /t 8
              5⤵
              • Delays execution with timeout.exe
              PID:2472
            • C:\Windows\system32\NOTEPAD.EXE
              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\note.txt
              5⤵
              • Opens file in notepad (likely ransom note)
              PID:2720
            • C:\Windows\system32\timeout.exe
              timeout /t 3
              5⤵
              • Delays execution with timeout.exe
              PID:2744
            • C:\Windows\system32\shutdown.exe
              shutdown /r /t 5 /m "Windows Error {Gateway Error: 23}"
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:268
            • C:\Windows\system32\NOTEPAD.EXE
              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\note2.txt
              5⤵
              • Opens file in notepad (likely ransom note)
              PID:2996
    • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" /n "C:\Users\Admin\Desktop\StartUninstall.pot"
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:3040

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\7272.tmp\7273.tmp\7274.bat

              Filesize

              331B

              MD5

              fb2390ea0912c032c5400d48968999c5

              SHA1

              096861629584e77c3cc98d1712f82459b0f984e3

              SHA256

              7898e0ca3640114c202bc3a3a08c93f11c4148279b34cf7860f49443b343b1d2

              SHA512

              8c2bcc40fd2dc93729c035c0b127fae00cf0ca8120b95d5a9627fb72077210975695564758eba8a22c19cab0b5b596e769c75af793a9852b7c033f57a0e4867c

            • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\autorun.cdd

              Filesize

              13KB

              MD5

              f1886a3ccd3af98ac1fb13bd1c7c8a45

              SHA1

              c9992562f97ad612bee7da6c17fbc9bb8948ab3d

              SHA256

              109e9510f3a8fe03bd891e356e2b1681d707aea233fa8887197dcf478dbe4238

              SHA512

              5d605bc569fa7b9c98a3122ebc78cc50ce45e1a2ce13fe3c9b9e555644985d8a9ebc4213fd06d4ae57841d52137b5d495e46c77b70d1f8ea4e88ef1f0407585a

            • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\lua5.1.dll

              Filesize

              322KB

              MD5

              c3256800dce47c14acc83ccca4c3e2ac

              SHA1

              9d126818c66991dbc3813a65eddb88bbcf77f30a

              SHA256

              f26f4f66022acc96d0319c09814ebeda60f4ab96b63b6262045dc786dc7c5866

              SHA512

              6865a98ad8a6bd02d1ba35a28b36b6306af393f5e9ad767cd6da027bb021f7399d629423f510c44436ac3e4603b6c606493edf8b14d21fabf3eab16d37bd0d25

            • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\note.txt

              Filesize

              28B

              MD5

              c795d3c9a28e426839d38112fcf2b4d6

              SHA1

              52c7c7ecd64382041140464b6a0c2d3924fa5dfe

              SHA256

              9cddde5871aaba593b65754405156454096f80248521e911ea1569e1b0a974d3

              SHA512

              47ac646d98998cd8af8637f53f795d9a92507a57d423d2e4f041330ddea1f39150975cb42d3df605a65ea29c1579a7710df310791048649c0b460ee21aceac69

            • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\note2.txt

              Filesize

              7B

              MD5

              a8f28f60e832d1a678e19be7e462dc4c

              SHA1

              fd57c8c97e2271b2ae89416bac29cf50527b21fd

              SHA256

              0c8a6fb6fe59b6dc0323e9a78c093df5876ffdcb274d5a597fcc022bada61f4e

              SHA512

              eb48c2e148c7c5cfe2b829f0bbac7d07686cb7e8a05c0ddd553cef1cdec490a7b2599119a8e3630ae1c3997408df609bb0d4fb045e87636c51b1a39d3ebef4cb

            • \Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Docs\B.exe

              Filesize

              89KB

              MD5

              97bc56c019bcc4128d156327373d568c

              SHA1

              756666370a57a8b2410b770307b7858baecdaa0e

              SHA256

              f92cd427afce9e4b1025f1e1a7f094c916abe850e98125b1939458cb7cca608c

              SHA512

              ddbb143348fd37c8c5377bac491a1bd699a9ac9b1530c7366d748d6670e8b6dacea9afd4f1101438ca68b436af15dbb664e2fa17c414be63d23e0c3b908cd779

            • \Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe

              Filesize

              6.1MB

              MD5

              92b320ed576ae9fa5184ddb05b0a42de

              SHA1

              6bf12f2a683027dcf2132484189e90490ce15825

              SHA256

              d963ce914724e0fa09a0c0217a6661f8fdb4f59966ab982a8f27321b6cfe0eee

              SHA512

              51db9dcd0b0a590dc778b927b8e9b2fc1ca40dbb9ebad302be51e86e1f4234b182de7b856fd035a5f6846050d8f6addd552a5a4aea9639f606ea9e768087bde8

            • memory/2700-29-0x000000002DE21000-0x000000002DE22000-memory.dmp

              Filesize

              4KB

            • memory/2700-36-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/2700-37-0x00000000718CD000-0x00000000718D8000-memory.dmp

              Filesize

              44KB

            • memory/2700-39-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/2700-40-0x00000000718CD000-0x00000000718D8000-memory.dmp

              Filesize

              44KB