Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2024 18:40

General

  • Target

    1cfe24134ac27665ed875996736b89a9375e4a27575698692e64005dd4aea534.exe

  • Size

    464KB

  • MD5

    105807abadfd508a6fa163878c69b766

  • SHA1

    24c007b4220c35879ed454d89c69183ce4a6ed51

  • SHA256

    1cfe24134ac27665ed875996736b89a9375e4a27575698692e64005dd4aea534

  • SHA512

    c7bfea78b974399ab13112b95014a730a817e54dd2a5e246b41fe7d7c71d4fd524d3edd281b5eb6a164f5f55dc27fc5df97e0a5b6aa7ac524c71127263626ec6

  • SSDEEP

    12288:v8lc87eqqV5e+wBV6O+RU4N6pQOoVSdRpluI:v8SqqHeVBx0U4goVSmI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of UnmapMainImage
    PID:3492
    • C:\Users\Admin\AppData\Local\Temp\1cfe24134ac27665ed875996736b89a9375e4a27575698692e64005dd4aea534.exe
      "C:\Users\Admin\AppData\Local\Temp\1cfe24134ac27665ed875996736b89a9375e4a27575698692e64005dd4aea534.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3760
      • C:\Users\Admin\AppData\Roaming\cleaetup\AtBrfmon.exe
        "C:\Users\Admin\AppData\Roaming\cleaetup"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4996
        • C:\Users\Admin\AppData\Local\Temp\~540B.tmp
          3492 475656 4996 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1412
  • C:\Windows\SysWOW64\dllhad32.exe
    C:\Windows\SysWOW64\dllhad32.exe -s
    1⤵
    • Executes dropped EXE
    PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~540B.tmp

    Filesize

    8KB

    MD5

    86dc243576cf5c7445451af37631eea9

    SHA1

    99a81c47c4c02f32c0ab456bfa23c306c7a09bf9

    SHA256

    25d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a

    SHA512

    c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4

  • C:\Users\Admin\AppData\Roaming\cleaetup\AtBrfmon.exe

    Filesize

    464KB

    MD5

    ba5d4e772d5c7d71c33e24171899d560

    SHA1

    9387ffd38c8354c5657d0b06ea6afc1148988040

    SHA256

    579716d0fd093eb01675d434f48a1b6bc839b6f5fe61086919fa7b2533914444

    SHA512

    b758255ebe4cd79642ab54b17dab8557d9e77e637b5a95fe6b91d9667650d86dd1a28ae7d69f1ac15bab9a16ecde3a64d9ad7f721da6b964a4a7b0ee86a975de

  • memory/2244-17-0x0000000000550000-0x00000000005CD000-memory.dmp

    Filesize

    500KB

  • memory/2244-19-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/3492-22-0x0000000002C20000-0x0000000002C2D000-memory.dmp

    Filesize

    52KB

  • memory/3492-20-0x0000000001350000-0x0000000001356000-memory.dmp

    Filesize

    24KB

  • memory/3492-18-0x00000000033F0000-0x0000000003474000-memory.dmp

    Filesize

    528KB

  • memory/3492-16-0x00000000033F0000-0x0000000003474000-memory.dmp

    Filesize

    528KB

  • memory/3760-1-0x0000000000550000-0x00000000005CD000-memory.dmp

    Filesize

    500KB

  • memory/3760-0-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/3760-25-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/4996-10-0x0000000000640000-0x0000000000645000-memory.dmp

    Filesize

    20KB

  • memory/4996-13-0x0000000000550000-0x00000000005CD000-memory.dmp

    Filesize

    500KB

  • memory/4996-6-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/4996-26-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB