Analysis

  • max time kernel
    142s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2024, 20:35

General

  • Target

    b0d6d840134314f12cc19584ec1daa38163c0c78ddb20c4ff29fdbea5ba42811.exe

  • Size

    22.9MB

  • MD5

    023877dd02a32eef6748ebfc1e50bfe6

  • SHA1

    3ba7a656c799652cd9fe1ae85ee1fcd12702a711

  • SHA256

    b0d6d840134314f12cc19584ec1daa38163c0c78ddb20c4ff29fdbea5ba42811

  • SHA512

    e91fcdcfb00c4c520d21950f4aa749c252f25660cd6a50c5cd9e418ebd1782e05890ec7a692e06ac8bb882163b5c99ce29268c0f1bd1f22e9328e8db78ff9667

  • SSDEEP

    393216:IfOrGCemdeSdvao1hzfK8hz2xinI1j2RBuCjykgkBiKEUOdbCuCWrcwY:IWfISdCWjSB2BykxjAbCurcwY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 13 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0d6d840134314f12cc19584ec1daa38163c0c78ddb20c4ff29fdbea5ba42811.exe
    "C:\Users\Admin\AppData\Local\Temp\b0d6d840134314f12cc19584ec1daa38163c0c78ddb20c4ff29fdbea5ba42811.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe
      C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E4142772-920F-47BB-8393-0F93D32EFE92}
      2⤵
      • Executes dropped EXE
      PID:2660
    • C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe
      C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{0E5CD4D9-3A24-4E73-B940-21718B156325}
      2⤵
      • Executes dropped EXE
      PID:2732
    • C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe
      C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{5BC0B0F7-91B6-4179-A2DE-2FFEB9457A4D}
      2⤵
      • Executes dropped EXE
      PID:2576
    • C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe
      C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{FB124832-71D0-48C8-B52C-828180391F9F}
      2⤵
      • Executes dropped EXE
      PID:2456
    • C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe
      C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{FEAC9271-D5CA-494A-B31C-1E81263B8CBD}
      2⤵
      • Executes dropped EXE
      PID:2856
    • C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe
      C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{FA3050E4-728F-4353-9CEC-86FEB2643383}
      2⤵
      • Executes dropped EXE
      PID:592
    • C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe
      C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6E42CFE7-251F-4229-A0A3-17AB0040424E}
      2⤵
      • Executes dropped EXE
      PID:1932
    • C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe
      C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{87E9CC91-9DC1-49A6-839C-E26138875AF0}
      2⤵
      • Executes dropped EXE
      PID:1156
    • C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe
      C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{74779DE4-CACE-438C-9E37-61F3D2100E12}
      2⤵
      • Executes dropped EXE
      PID:268
    • C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe
      C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{940BE7F7-9C49-4C7B-8D77-2E6F9FE33A2C}
      2⤵
      • Executes dropped EXE
      PID:2560
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\{3698F2D1-D758-4E48-8E1B-8DB842513A62}\0x0419.ini

    Filesize

    22KB

    MD5

    ed138eea392a23491e7f304d9e8d49cd

    SHA1

    15478e2a16759d809cd3ca48ffb4c35f2c619f9e

    SHA256

    a90ebd962b022491427b465e4983d1f941af5b7d2af7aac5bcadee40f6299755

    SHA512

    f8337e0300d7785da89eaaee107ca888aa6cde97fcecfaa5d2fb22e0fb95f24ba2ac8e9d7010233c76c3320d5d3d1546c8dab41b86c9182cf1fb1ce0e9a04b08

  • C:\Users\Admin\AppData\Local\Temp\{3698F2D1-D758-4E48-8E1B-8DB842513A62}\GEOSolution.msi

    Filesize

    5.7MB

    MD5

    4bdf87e7c335e948e28ac3d0b0517320

    SHA1

    01f7276d7008476e6a68600c5c7c7f5dd0d4c660

    SHA256

    a14cf01550ab4bb5ac7a354b68d1ac40ebaed173d6cf82645bd28ab5feda006e

    SHA512

    3c988b7b6777411edfe0db7e695155663b69428b802d9c2ae6f361a65c4e00bb56f6cb773d0a4ddec4082c35d2934380cff8185d7269f0bd826ae0e6171ae11e

  • C:\Users\Admin\AppData\Local\Temp\{3698F2D1-D758-4E48-8E1B-8DB842513A62}\ISSetup.dll

    Filesize

    1.3MB

    MD5

    603b77bffd63bd1194e647e862febc4f

    SHA1

    bf74a5ebce3475477ed20b425297985b616908c5

    SHA256

    6e0c3662988dabda47f687cdb4b7c73ffdb78b21d2aba9b7955f42824b9c11d0

    SHA512

    a59464be8d00cc616bfdebdaba39132a5bd2f9e51a09054098e25ed9620661f407bb96e0d6c64f5a8af2f84f68e78d6dcad6ff216ddd50803e0a8536b3389334

  • C:\Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\skinccd1.rra

    Filesize

    25KB

    MD5

    4b4710ec6332f22f2cc85744b6a2bd8c

    SHA1

    9978539594c4f9bf6ad98032f9bf2abd10d0b2b5

    SHA256

    e9ccebc18123b09ad7ec2ee208cb795a5dfbdbba9e60b31ccdd409636c5cf1c0

    SHA512

    813ea91adf0c84500350d55ee705c99393f9d0d099ef67c2afad1fc4701ef546f4ba41ef785ccabcf7e24ba92e212ccec3aa50b4f9fc690f5096e4f21d844be7

  • C:\Users\Admin\AppData\Local\Temp\~B4CE.tmp

    Filesize

    5KB

    MD5

    e15b7ac9f907c91a9ca2ceaff0f42b7a

    SHA1

    274c0ea6c0ad4cfba7c53d9ef3cc87b897b05f6e

    SHA256

    5ee59980eb03780a348787ef348fd6ff87bcd9d5b43afb8dce31abfd3464dc93

    SHA512

    eca8ca441ce2b2ec7c498f1f5dde970919a713872fa9caef02602b5c5b12d1ace56b4307eb55edc4054b5bdefb8d4fa4d2888d5e4125bbde9d3f91fa5e6c0869

  • \Users\Admin\AppData\Local\Temp\{3698F2D1-D758-4E48-8E1B-8DB842513A62}\ISSetup.dll

    Filesize

    2.3MB

    MD5

    f222918fa51a75f3f94b87c45c8429b4

    SHA1

    56f5922fab066a19454ecb6f916de033213e1b04

    SHA256

    516eb4c226a68bf69fded3b6d5e80b5a995f4f0cab062f89518df2e7aa7ee997

    SHA512

    5327bdc16431939ae7cb8fe7a3435e56d69efa4b6d8524cd8a2a732284d767a4f022eafecbbcee3f58c90703774eeab6cc723691eb44525a44ce3b9bdc2f981c

  • \Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISBEW64.exe

    Filesize

    177KB

    MD5

    a0b3a841543aaea61073def985414f9c

    SHA1

    1e8e77da0cba435f5c10c7a8849edb6f55a40199

    SHA256

    e396adab718c70c85c9d88e7b6f68cc16126b37e3201a89125a5788239b06c8c

    SHA512

    b52be3fb68917c1fcdba0dbad042439efefc45b88ff110437bf0afecbcbb9269ae6fc62f9a5ae44b3ee9ee009a2248759b3f8a674c6427063b70732fbce5b0b5

  • \Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\ISRT.dll

    Filesize

    172KB

    MD5

    71cd4ada58dc84dc4e7e84c0fd193791

    SHA1

    3bdfdb1883c506cb3968c06b6de176e2c86813ee

    SHA256

    25429b43ba6837a0c50c5150caa2adb8d38f0e705b58c8384d7edcca8f408f3b

    SHA512

    428776c8449104ed423c033695372e54407af59226fddc1c3fc9ed4fc09d79d3596046ee578b56c0f7e9bc35575896f1495fb1b4a99f9bebc6e6b45b17c45b8e

  • \Users\Admin\AppData\Local\Temp\{CBC07DCD-6144-4995-B3AA-5637DD30F4C8}\_isres_0x0419.dll

    Filesize

    1.4MB

    MD5

    c44cb84d9d57619e0feae55af72069a9

    SHA1

    1c58827d704181425ac906ce4fd529dfa8cbdd88

    SHA256

    e0a5c530267fc83350c78d0d11db565e1647029f10717004020581c72fa67aeb

    SHA512

    e8193124ffd4afe8d8322fc8bc73a0ffbacc6bb60b4f603378f5c7bd0b3a13ba36d9ee31cb07b378c8c83acfe133d3d24309bafb843875825dd1b670744a3133

  • memory/2292-42-0x0000000001F60000-0x0000000001F62000-memory.dmp

    Filesize

    8KB

  • memory/2292-88-0x0000000005510000-0x0000000005621000-memory.dmp

    Filesize

    1.1MB

  • memory/2292-89-0x0000000004AD0000-0x0000000004AD2000-memory.dmp

    Filesize

    8KB

  • memory/2292-41-0x0000000010000000-0x000000001024A000-memory.dmp

    Filesize

    2.3MB

  • memory/2292-3809-0x0000000010000000-0x000000001024A000-memory.dmp

    Filesize

    2.3MB

  • memory/2292-4052-0x0000000005510000-0x0000000005621000-memory.dmp

    Filesize

    1.1MB

  • memory/2292-5176-0x0000000010000000-0x000000001024A000-memory.dmp

    Filesize

    2.3MB

  • memory/2292-5177-0x0000000005510000-0x0000000005621000-memory.dmp

    Filesize

    1.1MB

  • memory/2292-5178-0x0000000001F60000-0x0000000001F62000-memory.dmp

    Filesize

    8KB

  • memory/2292-5181-0x0000000004AD0000-0x0000000004AD2000-memory.dmp

    Filesize

    8KB