Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-03-2024 15:00

General

  • Target

    de48fbfd909d2c24ccacc2e65a4f9a8e.exe

  • Size

    484KB

  • MD5

    de48fbfd909d2c24ccacc2e65a4f9a8e

  • SHA1

    741d46975981f5785d0c930113c21c996fc54f18

  • SHA256

    73b398cd11d22cbdee1b5ccab59849f5ab3114d26c0020548cf278465a88b963

  • SHA512

    869ead029cb4b001a750acaa728b28e9a23d6db2169b22dfe579f62c4086d852f2f956b52dc6fe895377dc7a911de6f35c7cd43e98bd10f316cb8c52bf3f03b4

  • SSDEEP

    12288:5ezW4GCJSzsY14+fmw1uF1GSKiZq0iDRtFUBSZtON0aRz6mHG:5kqW0wzdH

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de48fbfd909d2c24ccacc2e65a4f9a8e.exe
    "C:\Users\Admin\AppData\Local\Temp\de48fbfd909d2c24ccacc2e65a4f9a8e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c \stop.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Windows\SysWOW64\net.exe
        net stop sharedaccess
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop sharedaccess
          4⤵
            PID:2720
        • C:\Windows\SysWOW64\net.exe
          net stop alerter
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop alerter
            4⤵
              PID:2672
          • C:\Windows\SysWOW64\net.exe
            net stop vsmon
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2616
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop vsmon
              4⤵
                PID:2584
            • C:\Windows\SysWOW64\net.exe
              net stop minilog
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2468
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop minilog
                4⤵
                  PID:2084
              • C:\Windows\SysWOW64\net.exe
                net stop BlackICE
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2576
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop BlackICE
                  4⤵
                    PID:2880
                • C:\Windows\SysWOW64\net.exe
                  net stop SVW3
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2756
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop SVW3
                    4⤵
                      PID:2736
                  • C:\Windows\SysWOW64\net.exe
                    net stop NISUM
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2740
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop NISUM
                      4⤵
                        PID:2652
                    • C:\Windows\SysWOW64\net.exe
                      net stop NISSERV
                      3⤵
                        PID:2844
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop NISSERV
                          4⤵
                            PID:2424
                        • C:\Windows\SysWOW64\net.exe
                          net stop NVSVC32
                          3⤵
                            PID:2596
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop NVSVC32
                              4⤵
                                PID:2624
                            • C:\Windows\SysWOW64\net.exe
                              net stop NAVAP
                              3⤵
                                PID:2632
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 stop NAVAP
                                  4⤵
                                    PID:2572
                                • C:\Windows\SysWOW64\net.exe
                                  net stop NAVENG
                                  3⤵
                                    PID:2516
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 stop NAVENG
                                      4⤵
                                        PID:2732
                                    • C:\Windows\SysWOW64\net.exe
                                      net stop NAVEX15
                                      3⤵
                                        PID:2464
                                        • C:\Windows\SysWOW64\net1.exe
                                          C:\Windows\system32\net1 stop NAVEX15
                                          4⤵
                                            PID:2472
                                        • C:\Windows\SysWOW64\net.exe
                                          net stop NAV
                                          3⤵
                                            PID:2560
                                            • C:\Windows\SysWOW64\net1.exe
                                              C:\Windows\system32\net1 stop NAV
                                              4⤵
                                                PID:2808
                                            • C:\Windows\SysWOW64\net.exe
                                              net stop Auto-Protect
                                              3⤵
                                                PID:2824
                                                • C:\Windows\SysWOW64\net1.exe
                                                  C:\Windows\system32\net1 stop Auto-Protect
                                                  4⤵
                                                    PID:2840
                                                • C:\Windows\SysWOW64\net.exe
                                                  net stop AvgServ
                                                  3⤵
                                                    PID:2856
                                                    • C:\Windows\SysWOW64\net1.exe
                                                      C:\Windows\system32\net1 stop AvgServ
                                                      4⤵
                                                        PID:2864
                                                    • C:\Windows\SysWOW64\net.exe
                                                      net stop SweepNet
                                                      3⤵
                                                        PID:2960
                                                        • C:\Windows\SysWOW64\net1.exe
                                                          C:\Windows\system32\net1 stop SweepNet
                                                          4⤵
                                                            PID:2976
                                                        • C:\Windows\SysWOW64\net.exe
                                                          net stop AvSynMgr
                                                          3⤵
                                                            PID:2956
                                                            • C:\Windows\SysWOW64\net1.exe
                                                              C:\Windows\system32\net1 stop AvSynMgr
                                                              4⤵
                                                                PID:2972
                                                            • C:\Windows\SysWOW64\net.exe
                                                              net stop McShield
                                                              3⤵
                                                                PID:2996
                                                                • C:\Windows\SysWOW64\net1.exe
                                                                  C:\Windows\system32\net1 stop McShield
                                                                  4⤵
                                                                    PID:2104
                                                                • C:\Windows\SysWOW64\net.exe
                                                                  net stop SweepNet
                                                                  3⤵
                                                                    PID:2700
                                                                    • C:\Windows\SysWOW64\net1.exe
                                                                      C:\Windows\system32\net1 stop SweepNet
                                                                      4⤵
                                                                        PID:2212

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\stop.bat

                                                                  Filesize

                                                                  358B

                                                                  MD5

                                                                  80eca32f297879e7233214ccfa8fd802

                                                                  SHA1

                                                                  77bf3d64f0d670a034471263ced793a1d6d012d2

                                                                  SHA256

                                                                  1fb649fc22cebde183d02b48a609ee7e3daa2db047f87a2c7f9d6c9250cf6646

                                                                  SHA512

                                                                  3b42a3836c538e94bfef4f0ac5c1d1f9cc4e4b776b296d9299ed7bedd78df832c4d4c78a83c02d0815913c53ee4b0bfe3d2cc75b6762fdf3e1afff1a261135f9

                                                                • \Windows\SysWOW64\Mswinsck.ocx

                                                                  Filesize

                                                                  105KB

                                                                  MD5

                                                                  9484c04258830aa3c2f2a70eb041414c

                                                                  SHA1

                                                                  b242a4fb0e9dcf14cb51dc36027baff9a79cb823

                                                                  SHA256

                                                                  bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

                                                                  SHA512

                                                                  9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0