Analysis

  • max time kernel
    157s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-03-2024 19:32

General

  • Target

    d6f11dd1aa82f894f7b601c18e194329.exe

  • Size

    30KB

  • MD5

    d6f11dd1aa82f894f7b601c18e194329

  • SHA1

    3333f953d23e7e1e86e9bb94ff4c55868a1cf325

  • SHA256

    7defbdae55801fd6b55aea539ffabac92d196075ff39a071efc9a21313db919e

  • SHA512

    8a6aba4ff5b479494e35c531620bac282bebf3470f7416797481e51614b8f2ceb730f10c1b79c7a2afb6feac481531270de5f5aac1dbfb15e38f611eec027e0c

  • SSDEEP

    768:1yq2xyA5AFlT0OvYZoIfNsUFKyiVIZ7dq5S5Gc:wq2xLcNCZooNsIYIpd4c

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6f11dd1aa82f894f7b601c18e194329.exe
    "C:\Users\Admin\AppData\Local\Temp\d6f11dd1aa82f894f7b601c18e194329.exe"
    1⤵
    • Drops file in Drivers directory
    • Loads dropped DLL
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c cacls C:\Windows /e /p everyone:f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3540
      • C:\Windows\SysWOW64\cacls.exe
        cacls C:\Windows /e /p everyone:f
        3⤵
          PID:2912
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:620
        • C:\Windows\SysWOW64\cacls.exe
          cacls "C:\Users\Admin\AppData\Local\Temp\" /e /p everyone:f
          3⤵
            PID:3212
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c sc config ekrn start= disabled
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3040
          • C:\Windows\SysWOW64\sc.exe
            sc config ekrn start= disabled
            3⤵
            • Launches sc.exe
            PID:4276
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c taskkill /im ekrn.exe /f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /im ekrn.exe /f
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2760
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c taskkill /im egui.exe /f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4584
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /im egui.exe /f
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1812
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c taskkill /im ScanFrm.exe /f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3852
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /im ScanFrm.exe /f
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:3004
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe func.dll, droqp
          2⤵
          • Drops file in Drivers directory
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5016
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /all
          2⤵
          • Gathers network information
          PID:1292
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2284,i,2771196087253062161,8107167670425198948,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:3936

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\func.dll

          Filesize

          36KB

          MD5

          468efb776946a11b5ef892a9d2758e32

          SHA1

          932e2f59c6592b3bf16ef616b47700507e930ba8

          SHA256

          bff366c0d665b85a616884950cd1306f9aa961953b312c6cf8593b5c8dc1964a

          SHA512

          a42ed1699c221969726cfdc198e9554144c1a0771148eb7a285f188f7310103b5c5b1f022b87c25f1092f3cc5c9cb10bf09770c95ce1a4628fc087727aee39db

        • C:\Windows\phpi.dll

          Filesize

          44KB

          MD5

          a4d43e3f6c95d6972ac1c7b667576f13

          SHA1

          18db31786773cc0fd22a89cb65a4d17522778088

          SHA256

          54982eb802a2fd35f0b9707a38c7add15a2ae4f93fab7526ecf53dd0dc0b2c53

          SHA512

          aa36cee0fe9934aa586d48ac843f0b31a87b624cb2530f0c63c8d81d6318611cea3614b699e65bd2c2da3da630a3635eaafff8377e04569fba3004200f6ce78e

        • memory/1492-0-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB

        • memory/1492-1-0x0000000000500000-0x0000000000501000-memory.dmp

          Filesize

          4KB

        • memory/1492-6-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB