Analysis

  • max time kernel
    125s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/04/2024, 18:07

General

  • Target

    ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe

  • Size

    668KB

  • MD5

    f5a9217e194d53e7278423686286a391

  • SHA1

    fb77be3876a2dc7c3e310e9fa16e96e69915b315

  • SHA256

    ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84

  • SHA512

    9011e6f131318d13a2d635356d48ac768c3e2f76dda8e7148d6431ee37db4a478a6cce9a1686d69b89d1ecfb7671844b4b76f35ab8efeff6c88b3f38f27fbf3b

  • SSDEEP

    12288:tMMlcxAM4ssOdatX20XEnmf2xt8srDxm/RYSWt4lGU5626XJYSuDqe0HcBoB:1ciM4sAamfa8swC3OlGC6l5e0e

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe
    "C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Windows\system32\cmd.exe
      cmd.exe /c set
      2⤵
        PID:1244
      • C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe
        PECMD**pecmd-cmd* PUTF -dd -skipb=588800 -len=95855 "C:\Users\Admin\AppData\Local\Temp\~606230959033153049.tmp",,C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2572
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\~2350653744472187387\2.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2788
        • C:\Windows\system32\rundll32.exe
          rundll32 ./1713161804.dll dllentrypoint
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2508
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32 ./1713161804.dll dllentrypoint
            4⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:2416
            • C:\Windows\SysWOW64\rundll32.exe
              rundll32.exe
              5⤵
              • Blocklisted process makes network request
              PID:2544

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\~2350653744472187387\1713161804.dll

            Filesize

            261KB

            MD5

            4fe3607b4c01296b113e08f46cd76a04

            SHA1

            0267353daa20fb9d30d7460bab108d0a328d56b2

            SHA256

            247c09410d5ea2ee97500e91f0b3e57bb7290c1518084d3447c6fab8f08b235c

            SHA512

            0d405a8d17af2d6ea465452586f59522f5681b1d19c60e03f960202fdd8293bb36e97aa47ac66b5e79104beb1815ce5179a5032f4a8e2c80edf96af050b8f751

          • C:\Users\Admin\AppData\Local\Temp\~2350653744472187387\2.bat

            Filesize

            39B

            MD5

            715da46a4cc962d88be2cafe42eedd66

            SHA1

            9771b59f518541e0d069b52df70ccfe078cbcc3a

            SHA256

            6c782df52d05fb69739152b1de15314419416c8574abcd678d838c3d0574c735

            SHA512

            3740475d9a78f51d1a4ae8434b69c76fc6a115a06deda2e234cdb38f3903ff10e640dd2aa75e5a996709839b7f85691d75574e77bfe57389c247cff058d06c61

          • C:\Users\Admin\AppData\Local\Temp\~606230959033153049.tmp

            Filesize

            93KB

            MD5

            835b66cbbd0f128745bb599c5084116f

            SHA1

            f74e6458e1dec5a37451116ce0d2b8a3bcb72cc8

            SHA256

            783700e78c2994420768bb735212f079b6d5eaf6f0c2b62dd028f9319f464a08

            SHA512

            e260a98b65f76c2b25da9f1ef63770535918779c7a7f149d70682cd4057e83a5bda396dfbb73b2d74ed9002162163db764cc1ae5b0a43a4941411116edfe7f6a

          • memory/1988-0-0x0000000000400000-0x00000000004F4000-memory.dmp

            Filesize

            976KB

          • memory/1988-7-0x0000000002BB0000-0x0000000002CA4000-memory.dmp

            Filesize

            976KB

          • memory/1988-44-0x0000000000400000-0x00000000004F4000-memory.dmp

            Filesize

            976KB

          • memory/2544-37-0x00000000000D0000-0x0000000000110000-memory.dmp

            Filesize

            256KB

          • memory/2544-39-0x0000000000260000-0x0000000000294000-memory.dmp

            Filesize

            208KB

          • memory/2544-43-0x00000000000D0000-0x0000000000110000-memory.dmp

            Filesize

            256KB

          • memory/2572-8-0x0000000000400000-0x00000000004F4000-memory.dmp

            Filesize

            976KB

          • memory/2572-10-0x0000000000400000-0x00000000004F4000-memory.dmp

            Filesize

            976KB