Analysis

  • max time kernel
    150s
  • max time network
    166s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14/03/2024, 21:09

General

  • Target

    heheman.bat

  • Size

    30B

  • MD5

    0cfd83d222033e9ee666e2ceb8e950db

  • SHA1

    83167b94d243c3715136a8b2d9612d493674fdb3

  • SHA256

    63e3e8797f166b791671e9181cd65b5c6e40a3ebbd8aae405bacf56516972868

  • SHA512

    a3d0a51ee25a872f0531c96e5650c3a1051dccb0aa47b7b55812678dda3a0fdf5b867d4d41a11522322e520a5005ad5b607669c8cfaecab93a21ca492a432471

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\heheman.bat"
    1⤵
    • Enumerates connected drives
    PID:4016
  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4068
    • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
      "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
      2⤵
        PID:3320
      • C:\Windows\SysWOW64\unregmp2.exe
        "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1584
        • C:\Windows\system32\unregmp2.exe
          "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
          3⤵
          • Enumerates connected drives
          • Suspicious use of AdjustPrivilegeToken
          PID:332
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
      1⤵
        PID:3612
      • C:\Windows\System32\oobe\UserOOBEBroker.exe
        C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
        1⤵
        • Drops file in Windows directory
        PID:4780
      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
        C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
        1⤵
          PID:2484
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DevicesFlow -s DevicesFlowUserSvc
          1⤵
            PID:3280
          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
            C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
            1⤵
              PID:2144
            • C:\Windows\system32\SystemSettingsAdminFlows.exe
              "C:\Windows\system32\SystemSettingsAdminFlows.exe" FeaturedResetPC
              1⤵
              • Loads dropped DLL
              • Enumerates connected drives
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:3784
            • C:\Windows\System32\vdsldr.exe
              C:\Windows\System32\vdsldr.exe -Embedding
              1⤵
                PID:1496
              • C:\Windows\System32\vds.exe
                C:\Windows\System32\vds.exe
                1⤵
                • Checks SCSI registry key(s)
                PID:4608

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                      Filesize

                      64KB

                      MD5

                      d2ef79666180e535690b6c2cac188b72

                      SHA1

                      47e9bad5f130d9c78d59d34e06eff9d80ae534d3

                      SHA256

                      9913254ed01bdd8987c352aeea8e2bfdf79c55cd26314300c03d3b0bbbfd2f02

                      SHA512

                      c77b0b44e5797467c5ddca1de8bb6c63633e05a1e30101948cf0ee581ddc6507d05f66bd709e666f5785f46838d5fdaf602172186189fcdadcfb626c40c61e4e

                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\logs\Common\FileCoAuth-2024-3-14.2110.2484.1.odl

                      Filesize

                      706B

                      MD5

                      315ab4400f8cddc5d026e5114b6ef932

                      SHA1

                      35c3db05004f6f5bc36cdaeb7c3c62425d649b5e

                      SHA256

                      cf95adc2073f69aabebfa8d4305aa6a6903bc26b8281c56a68de6a2bca3c263c

                      SHA512

                      f505611bdbce04874b93a5f19ce657f2d14bab1febefa081835ff7f0191bb7ec0305834ba561f4010543271a7a2d0e9ba36b0fdd70e74147aba7eed029f9969e

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

                      Filesize

                      9KB

                      MD5

                      7050d5ae8acfbe560fa11073fef8185d

                      SHA1

                      5bc38e77ff06785fe0aec5a345c4ccd15752560e

                      SHA256

                      cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                      SHA512

                      a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                    • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

                      Filesize

                      1KB

                      MD5

                      25f02fc698a77c547ca4c00584369762

                      SHA1

                      5b41953edd663fccecd03d8440fec5dbe8bb4636

                      SHA256

                      04d429df4e1ddf96d3d4f35186e5d55227741b382e8920aa8bc62da1957dc0a9

                      SHA512

                      d558e6b20989d72d5834d0bbfee8189eaa69bcec1db5b1dce958503ba2b00c596c212c6ccdcf559fef2d64f493bdd7ae77098c04db6c455e76873ff194634264

                    • C:\Users\Admin\AppData\Local\Temp\{DCE7D6F8-7A30-4C74-8854-16D6EECCC0AC}\ssshim.dll

                      Filesize

                      148KB

                      MD5

                      3de653713e705e001c3f0be1efc51ed3

                      SHA1

                      63565592c266226d36604933e51725e90010da25

                      SHA256

                      c78ebef77e03135b3cea0705d4c259d782ed80746faea4e9f4a851e494fa94f9

                      SHA512

                      7db1063fa2a7c0bcf394d7a20984ab1b501cb24fae5e801addace77424ba773c948a87d8c3fb38f06366b1478f70ba0278c48f219d224ff6e904ff2ee161fb4e