Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 22:49

General

  • Target

    c70c5e935d65feca98f77cc2fc392e28.exe

  • Size

    33KB

  • MD5

    c70c5e935d65feca98f77cc2fc392e28

  • SHA1

    5cf7dca6b2011590fba81b893686aaeea81a8f37

  • SHA256

    f59546a8c41b210af7702fc9f5db9ab19e0e99bbad2e7fb17c26451ddf900689

  • SHA512

    576a641bc6fd540a07b265dae11d723acd8c3e565f1d7dcf23f57d71e462acd743be44cbe404bfc8e7c25e8dcd4fed8248c5c93c3eb5522d85c592ac4588caa2

  • SSDEEP

    768:xPH4rKS4GDkQBZ3ImWlTtEIRlJ+qFZ2bSgJzANqM3wJJiT:xf4exGDkeZ4mOoSgJEAJJM

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c70c5e935d65feca98f77cc2fc392e28.exe
    "C:\Users\Admin\AppData\Local\Temp\c70c5e935d65feca98f77cc2fc392e28.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\dt.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K c:\windows\temp\r.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Windows\SysWOW64\net.exe
          net stop sharedaccess
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2524
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop sharedaccess
            5⤵
              PID:2532
          • C:\Windows\SysWOW64\ftp.exe
            ftp -s:c:\windows\temp\f.txt
            4⤵
              PID:2408
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K c:\windows\temp\c.bat
              4⤵
                PID:2596

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\dt.bat

          Filesize

          1KB

          MD5

          7d0eb762b413b74951aeaf9f827abd27

          SHA1

          d74286cbc059b13be3435b794a1ffcc36086d5b3

          SHA256

          856eee0ff6b8b730bd499fcb6547da86b23941222fc04507170ea4775845ba6c

          SHA512

          d7706275e525ee30b38f938c72a4c985054bfe7bd083184d336a4aa1bc4df88d85c341ec1448bac28840e460e2c5619d89aaca8e616358efee2b5f7b4b431433

        • \??\c:\windows\temp\c.bat

          Filesize

          35B

          MD5

          57825840dd74a802acbefce3d055ede5

          SHA1

          6cdf5e84e7f25a2dd7ca8197c46af9f8f600f4e8

          SHA256

          6da483818b7a32e2d9fab191c069a9a04c15d22124969345439edbd6e20b70f4

          SHA512

          a7c46527e6f2c24136351effc7ee0acce1c7b31f67d6b673b6547a31c97f4e988f8b8ab60e40ad5b6d94a2d9df0cef964800a4fb380a41d1ce9b89de47a9cf1a

        • \??\c:\windows\temp\f.txt

          Filesize

          79B

          MD5

          1302f01cdcbb0f9c80b6f3dfbd242e47

          SHA1

          5dc9b4a95020de2bc0bfa17829da6d44c9b6c1b8

          SHA256

          d0b46dd67ee171c1e1b729925f6113639f1d9e9e352f1661b90109c72818589c

          SHA512

          0b3ab58fab71c4da1ef3146d3d66536c710204f997cddcefcfc45dab46e231957eeb92f5b4f1f7d6755a948cb3d41c9acf9691b03ccd25c27e3b708a6a78933d

        • \??\c:\windows\temp\r.bat

          Filesize

          219B

          MD5

          a124d413f23742f55bff38537701ecd9

          SHA1

          d0edbd0a8b61ec274f9ac420f1059f8710619da2

          SHA256

          ba40e6953acd601d2132d2202e64c1482f497631ed140bb33b05477f05c85139

          SHA512

          a1d5c8a49ad362f34fb52b93b799711a59742d7f828beddb82ce31f99e305ea9aa4b5b39b73c766fd41079962ad9f9bbe68eca4834e6db68b5dac907862c4773