Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2024, 18:40

General

  • Target

    1cfe24134ac27665ed875996736b89a9375e4a27575698692e64005dd4aea534.exe

  • Size

    464KB

  • MD5

    105807abadfd508a6fa163878c69b766

  • SHA1

    24c007b4220c35879ed454d89c69183ce4a6ed51

  • SHA256

    1cfe24134ac27665ed875996736b89a9375e4a27575698692e64005dd4aea534

  • SHA512

    c7bfea78b974399ab13112b95014a730a817e54dd2a5e246b41fe7d7c71d4fd524d3edd281b5eb6a164f5f55dc27fc5df97e0a5b6aa7ac524c71127263626ec6

  • SSDEEP

    12288:v8lc87eqqV5e+wBV6O+RU4N6pQOoVSdRpluI:v8SqqHeVBx0U4goVSmI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\1cfe24134ac27665ed875996736b89a9375e4a27575698692e64005dd4aea534.exe
      "C:\Users\Admin\AppData\Local\Temp\1cfe24134ac27665ed875996736b89a9375e4a27575698692e64005dd4aea534.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Users\Admin\AppData\Roaming\bitsexer\calcerpt.exe
        "C:\Users\Admin\AppData\Roaming\bitsexer"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Users\Admin\AppData\Local\Temp\~8E1C.tmp
          1200 475656 2984 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2924
  • C:\Windows\SysWOW64\mtstup16.exe
    C:\Windows\SysWOW64\mtstup16.exe -s
    1⤵
    • Executes dropped EXE
    PID:2680

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\~8E1C.tmp

          Filesize

          8KB

          MD5

          86dc243576cf5c7445451af37631eea9

          SHA1

          99a81c47c4c02f32c0ab456bfa23c306c7a09bf9

          SHA256

          25d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a

          SHA512

          c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4

        • \Users\Admin\AppData\Roaming\bitsexer\calcerpt.exe

          Filesize

          464KB

          MD5

          2fa624e58053e1890f00f62bfca0d394

          SHA1

          0bdc502a9549b62feeabe73b5fb12a6029c0f890

          SHA256

          224d30f0b672a05171d7476dddacfaa7d4e1c04919e880070ac282b514113db2

          SHA512

          e46e2a852144dcbab11a7a38211bf9990f603ae97253f2e837a871bfadc89f133b258a1dcbec862395a41e3ce3c4fcd86f6fdee80d91604019e2723510e2469d

        • memory/1200-26-0x0000000002B50000-0x0000000002B56000-memory.dmp

          Filesize

          24KB

        • memory/1200-20-0x0000000004320000-0x00000000043A4000-memory.dmp

          Filesize

          528KB

        • memory/1200-18-0x0000000004320000-0x00000000043A4000-memory.dmp

          Filesize

          528KB

        • memory/1200-22-0x0000000004320000-0x00000000043A4000-memory.dmp

          Filesize

          528KB

        • memory/1200-29-0x0000000002C50000-0x0000000002C5D000-memory.dmp

          Filesize

          52KB

        • memory/2680-36-0x0000000002C50000-0x0000000002C5D000-memory.dmp

          Filesize

          52KB

        • memory/2680-32-0x0000000000400000-0x000000000047A000-memory.dmp

          Filesize

          488KB

        • memory/2680-33-0x0000000002C50000-0x0000000002C5D000-memory.dmp

          Filesize

          52KB

        • memory/2772-10-0x0000000001CB0000-0x0000000001D2A000-memory.dmp

          Filesize

          488KB

        • memory/2772-0-0x0000000000400000-0x000000000047A000-memory.dmp

          Filesize

          488KB

        • memory/2772-35-0x0000000000400000-0x000000000047A000-memory.dmp

          Filesize

          488KB

        • memory/2772-1-0x00000000004F0000-0x000000000056D000-memory.dmp

          Filesize

          500KB

        • memory/2772-16-0x0000000001CB0000-0x0000000001D2A000-memory.dmp

          Filesize

          488KB

        • memory/2984-19-0x00000000004F0000-0x000000000056D000-memory.dmp

          Filesize

          500KB

        • memory/2984-23-0x0000000000400000-0x000000000047A000-memory.dmp

          Filesize

          488KB

        • memory/2984-21-0x00000000001D0000-0x00000000001D5000-memory.dmp

          Filesize

          20KB