Analysis

  • max time kernel
    60s
  • max time network
    56s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-uk
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-uklocale:uk-uaos:windows10-2004-x64systemwindows
  • submitted
    11/03/2024, 12:43

General

  • Target

  • Size

    2.0MB

  • MD5

    c7e9746b1b039b8bd1106bca3038c38f

  • SHA1

    cb93ac887876bafe39c5f9aa64970d5e747fb191

  • SHA256

    b1369bd254d96f7966047ad4be06103830136629590182d49e5cb8680529ebd4

  • SHA512

    cf5d688f1aec8ec65c1cb91d367da9a96911640c695d5c2d023836ef11e374ff158c152b4b6207e8fcdb5ccf0eed79741e080f1cbc915fe0af3dacd624525724

  • SSDEEP

    49152:FH/1Fdq0wneDrEoYxWFjmYMcKabLVp3diY7kp:FH/1Fdq0nIo2YAcl/NisA

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\[email protected]
    "C:\Users\Admin\AppData\Local\Temp\[email protected]"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3268
    • C:\Windows\SysWOW64\net.exe
      net stop wscsvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4220
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop wscsvc
        3⤵
          PID:2080
      • C:\Windows\SysWOW64\net.exe
        net stop winmgmt /y
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4340
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop winmgmt /y
          3⤵
            PID:2608
        • C:\Windows\SysWOW64\net.exe
          net start winmgmt
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2084
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start winmgmt
            3⤵
              PID:4984
          • C:\Windows\SysWOW64\net.exe
            net start wscsvc
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4524
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start wscsvc
              3⤵
                PID:5076
            • C:\Windows\SysWOW64\Wbem\mofcomp.exe
              mofcomp C:\Users\Admin\AppData\Local\Temp\4otjesjty.mof
              2⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3920
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
            1⤵
            • Drops file in System32 directory
            • Suspicious use of AdjustPrivilegeToken
            PID:3452
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
            1⤵
              PID:872

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\4otjesjty.mof

                    Filesize

                    443B

                    MD5

                    7fad92afda308dca8acfc6ff45c80c24

                    SHA1

                    a7fa35e7f90f772fc943c2e940737a48b654c295

                    SHA256

                    76e19416eb826a27bdcf626c3877cf7812bbe9b62cc2ccc5c2f65461d644246f

                    SHA512

                    49eed1e1197401cb856064bf7fdbd9f3bc57f3c864d47f509346d44eed3b54757d8c6cdb6254990d21291065f0762d2a1588d09e43c5728f77a420f6a8dcd6ea

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_k5k2ecy1.jkm.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • memory/872-7-0x000001E4FEF90000-0x000001E4FEFB2000-memory.dmp

                    Filesize

                    136KB

                  • memory/872-17-0x00007FFECA440000-0x00007FFECAF01000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/872-18-0x000001E4FF410000-0x000001E4FF420000-memory.dmp

                    Filesize

                    64KB

                  • memory/872-19-0x000001E4FF410000-0x000001E4FF420000-memory.dmp

                    Filesize

                    64KB

                  • memory/872-20-0x000001E4FF250000-0x000001E4FF294000-memory.dmp

                    Filesize

                    272KB

                  • memory/872-21-0x000001E4FF320000-0x000001E4FF396000-memory.dmp

                    Filesize

                    472KB

                  • memory/872-23-0x000001E4FF410000-0x000001E4FF420000-memory.dmp

                    Filesize

                    64KB

                  • memory/872-26-0x00007FFECA440000-0x00007FFECAF01000-memory.dmp

                    Filesize

                    10.8MB