Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 18:07

General

  • Target

    ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe

  • Size

    668KB

  • MD5

    f5a9217e194d53e7278423686286a391

  • SHA1

    fb77be3876a2dc7c3e310e9fa16e96e69915b315

  • SHA256

    ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84

  • SHA512

    9011e6f131318d13a2d635356d48ac768c3e2f76dda8e7148d6431ee37db4a478a6cce9a1686d69b89d1ecfb7671844b4b76f35ab8efeff6c88b3f38f27fbf3b

  • SSDEEP

    12288:tMMlcxAM4ssOdatX20XEnmf2xt8srDxm/RYSWt4lGU5626XJYSuDqe0HcBoB:1ciM4sAamfa8swC3OlGC6l5e0e

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 8 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe
    "C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe"
    1⤵
    • Adds Run key to start application
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c set
      2⤵
        PID:5100
      • C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe
        PECMD**pecmd-cmd* PUTF -dd -skipb=588800 -len=95855 "C:\Users\Admin\AppData\Local\Temp\~7651150042606607205.tmp",,C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2436
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\~5006525051632653882\2.bat" "
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2940
        • C:\Windows\system32\rundll32.exe
          rundll32 ./1713161804.dll dllentrypoint
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1048
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32 ./1713161804.dll dllentrypoint
            4⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3260
            • C:\Windows\SysWOW64\rundll32.exe
              rundll32.exe
              5⤵
              • Blocklisted process makes network request
              PID:64

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~5006525051632653882\1713161804.dll

      Filesize

      261KB

      MD5

      4fe3607b4c01296b113e08f46cd76a04

      SHA1

      0267353daa20fb9d30d7460bab108d0a328d56b2

      SHA256

      247c09410d5ea2ee97500e91f0b3e57bb7290c1518084d3447c6fab8f08b235c

      SHA512

      0d405a8d17af2d6ea465452586f59522f5681b1d19c60e03f960202fdd8293bb36e97aa47ac66b5e79104beb1815ce5179a5032f4a8e2c80edf96af050b8f751

    • C:\Users\Admin\AppData\Local\Temp\~5006525051632653882\2.bat

      Filesize

      39B

      MD5

      715da46a4cc962d88be2cafe42eedd66

      SHA1

      9771b59f518541e0d069b52df70ccfe078cbcc3a

      SHA256

      6c782df52d05fb69739152b1de15314419416c8574abcd678d838c3d0574c735

      SHA512

      3740475d9a78f51d1a4ae8434b69c76fc6a115a06deda2e234cdb38f3903ff10e640dd2aa75e5a996709839b7f85691d75574e77bfe57389c247cff058d06c61

    • C:\Users\Admin\AppData\Local\Temp\~7651150042606607205.tmp

      Filesize

      93KB

      MD5

      835b66cbbd0f128745bb599c5084116f

      SHA1

      f74e6458e1dec5a37451116ce0d2b8a3bcb72cc8

      SHA256

      783700e78c2994420768bb735212f079b6d5eaf6f0c2b62dd028f9319f464a08

      SHA512

      e260a98b65f76c2b25da9f1ef63770535918779c7a7f149d70682cd4057e83a5bda396dfbb73b2d74ed9002162163db764cc1ae5b0a43a4941411116edfe7f6a

    • C:\Users\Admin\AppData\Local\Temp\~~6159326100825929457.tmp

      Filesize

      120B

      MD5

      80507abb0b1575866c4a0e5ef9ec28bd

      SHA1

      bbadf07fc5300dcf42963b23ab635696caf4315b

      SHA256

      fd5d88b7220de1a9732bf6fc39980e50285c3f77e1f040dbf93060880a0f695e

      SHA512

      b4573e394044bcfc8f52656224e8266d091f30a22b6e32f3d488e61cc574aab603771460c253dd5325f1dca104a49dee53fe26890a3c516eef1195b1e31c7079

    • memory/64-27-0x0000000000C00000-0x0000000000C40000-memory.dmp

      Filesize

      256KB

    • memory/64-28-0x0000000001080000-0x00000000010B4000-memory.dmp

      Filesize

      208KB

    • memory/2332-0-0x0000000000400000-0x00000000004F4000-memory.dmp

      Filesize

      976KB

    • memory/2332-32-0x0000000000400000-0x00000000004F4000-memory.dmp

      Filesize

      976KB

    • memory/2436-8-0x0000000000400000-0x00000000004F4000-memory.dmp

      Filesize

      976KB