Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2024, 21:29

General

  • Target

    c6e6996a04bf0f709cf84f13a3beb90c.exe

  • Size

    570KB

  • MD5

    c6e6996a04bf0f709cf84f13a3beb90c

  • SHA1

    b93db1b99d5a183e3953d645ff4d3296119fe185

  • SHA256

    1248cc6d3f2900de0b073345be305fe525656a27fe8d63851db4b9e224e3e439

  • SHA512

    e1e33fd96811d5102ccacf7645d762d6d7e27d54e6515cabf321e8ef0c692b3023b81c67ce303b2b5010d273b0c5d5a897d1c01af909d529c439e5f6d9605902

  • SSDEEP

    12288:nRV55eEX6fwDLZg92X99u7peLLwBxw1Q8BK2tuPDbyau:nRVneBw5jutlP8BK+uvyL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6e6996a04bf0f709cf84f13a3beb90c.exe
    "C:\Users\Admin\AppData\Local\Temp\c6e6996a04bf0f709cf84f13a3beb90c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\bgcabfeicc.exe
      C:\Users\Admin\AppData\Local\Temp\bgcabfeicc.exe 6-2-5-8-2-7-4-9-7-5-0 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81710365389.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2464
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81710365389.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2988
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81710365389.txt bios get version
        3⤵
          PID:2632
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81710365389.txt bios get version
          3⤵
            PID:2388
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81710365389.txt bios get version
            3⤵
              PID:1428
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 372
              3⤵
              • Loads dropped DLL
              • Program crash
              PID:2428

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\81710365389.txt

          Filesize

          66B

          MD5

          9025468f85256136f923096b01375964

          SHA1

          7fcd174999661594fa5f88890ffb195e9858cc52

          SHA256

          d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

          SHA512

          92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

        • C:\Users\Admin\AppData\Local\Temp\81710365389.txt

          Filesize

          2B

          MD5

          f3b25701fe362ec84616a93a45ce9998

          SHA1

          d62636d8caec13f04e28442a0a6fa1afeb024bbb

          SHA256

          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

          SHA512

          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

        • C:\Users\Admin\AppData\Local\Temp\81710365389.txt

          Filesize

          58B

          MD5

          dd876faf0fd44a5fab3e82368e2e8b15

          SHA1

          01b04083fa278dda3a81705ca5abcfee487a3c90

          SHA256

          5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

          SHA512

          e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

        • \Users\Admin\AppData\Local\Temp\bgcabfeicc.exe

          Filesize

          826KB

          MD5

          eebbc8533431e93573cc05358ca7df80

          SHA1

          1294bc96565f824eb4d227895e5e5075a694a552

          SHA256

          b804182d6f73a0d156fe8604488a536e1e2e78993bca5ced448cd41a56203ceb

          SHA512

          91c059a088851f8e30416de174d40dc7c44d7bcbf4a89bf17266e88252e2c9fbe8de66e718e5104fbb22e49d0efc79fe5f3eaec525ed04126b8576814a7a6d46

        • \Users\Admin\AppData\Local\Temp\nsjACD4.tmp\kkss.dll

          Filesize

          108KB

          MD5

          e061a371413b7c7f73b469271ea6254a

          SHA1

          f3f027961dc7a923a431d7432c7096775aa1ab24

          SHA256

          7f721c31c87e0aa58ef48e14e582edcefeedfb8675742b67c9f2fd6a39b0f708

          SHA512

          6d9e42cd6569dc6d11391a8356582b5e87d84558c9be07fb01a9060ef6317de50fae2e74604dc82499f2878864ae8e02b3cc328f115bf3af2c2f4e8dc7e6fe48

        • \Users\Admin\AppData\Local\Temp\nsjACD4.tmp\nsisunz.dll

          Filesize

          40KB

          MD5

          5f13dbc378792f23e598079fc1e4422b

          SHA1

          5813c05802f15930aa860b8363af2b58426c8adf

          SHA256

          6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

          SHA512

          9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5