Resubmissions

22-04-2024 22:02

240422-1xtwbagh68 10

22-04-2024 19:25

240422-x42b7afa68 10

19-04-2024 03:02

240419-djmthsfh8w 10

Analysis

  • max time kernel
    144s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-04-2024 22:02

General

  • Target

    11571917015adbf3b5196509e1082c8d415f011cce88bd8b16e9d9c5a39ac432.exe

  • Size

    14.4MB

  • MD5

    ecaa6f88c3b6594914a8ffde04fd5d84

  • SHA1

    885e4370299d369f7285ba5f2c544cbcd70a5fd0

  • SHA256

    11571917015adbf3b5196509e1082c8d415f011cce88bd8b16e9d9c5a39ac432

  • SHA512

    94712c9ceddc1e2abd7ec19dc39bf2cbea54d3430f66887e2e0861c2cdb4c4ee24c39d3140c9374e826049516b814c3fcfcf4c49402bc5c2335d87bc0ee67f83

  • SSDEEP

    393216:hp8QGQCKH9iqYCfy8tW5MrYR0aioa4CMRmrrCZRBkyQzy:v8QGrK5GXR9ioaJMRmrrdysy

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11571917015adbf3b5196509e1082c8d415f011cce88bd8b16e9d9c5a39ac432.exe
    "C:\Users\Admin\AppData\Local\Temp\11571917015adbf3b5196509e1082c8d415f011cce88bd8b16e9d9c5a39ac432.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\GUBootService.exe
      "C:\Users\Admin\AppData\Local\Temp\GUBootService.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Windows\SysWOW64\more.com
        C:\Windows\SysWOW64\more.com
        3⤵
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Users\Admin\AppData\Local\Temp\Fahu.au3
          C:\Users\Admin\AppData\Local\Temp\Fahu.au3
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:344
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 344 -s 252
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:1612

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1392b07a
    Filesize

    1.8MB

    MD5

    eaf0c346517850bf91ff3ab02d1553f3

    SHA1

    22a6784e63ccc6ae25c9b0135b27ffb9756cc2de

    SHA256

    0b341adb972ea0f8f06b3b4fa7fd3dd04e68d4322948fc19f93bc92503c97528

    SHA512

    7374a87f7bdad88ccb930fc53b858b42e56f83e8a270105ca667466ee5d8c16eb12c47949a90fe80ce7eae2727d074b7df597f5e665613d316cbffc07c05264c

  • C:\Users\Admin\AppData\Local\Temp\b9257f8
    Filesize

    2.0MB

    MD5

    d2235aeb97c1be6fbdd13517579bcbf9

    SHA1

    335abcda67ceab10c96bf4855642e031d65aa282

    SHA256

    fa699bcb14ae008a91105ab5ba25744e1f16420b95c628ce21329b285cee511a

    SHA512

    e4fcedf30de47a134d77ebd245c1e4036c8cdffdea84a44dad982e5c62346fc8ff304266e8b62d190159c5c6619d1bf5dc1ff8d70e73f78d56015d6f661c2041

  • \Users\Admin\AppData\Local\Temp\Fahu.au3
    Filesize

    925KB

    MD5

    0162a97ed477353bc35776a7addffd5c

    SHA1

    10db8fe20bbce0f10517c510ec73532cf6feb227

    SHA256

    15600ccdef5a64b40d206d89234a51be1e11bd878dcefc5986590bcf40d9d571

    SHA512

    9638cab1aabe78c22a3d3528a391544f697d792640d831516b63fa52c393ee96bb588223e70163d059208cc5a14481c5ff7ef6ba9ac572322798a823d67f01f5

  • \Users\Admin\AppData\Local\Temp\GUBootService.exe
    Filesize

    11.5MB

    MD5

    4a053e8f03eba1dd6fcd28aeea8dc05f

    SHA1

    080d5f4b1c1e892658672aded073b70dfd14f7de

    SHA256

    6a5cc7a1803b002e91129d9317fa8f2d79fc07775ded7163c38d41569f8068ed

    SHA512

    32e3cc6fbb5db6b38c5aa18b3bb077c9e03e218d3698d6a30a6e62bfcba2692d4b625b286df0604637a5a7488d8215406c46f337f8ca908081b300a58945de3d

  • memory/344-140-0x0000000000510000-0x000000000055D000-memory.dmp
    Filesize

    308KB

  • memory/344-139-0x0000000000510000-0x000000000055D000-memory.dmp
    Filesize

    308KB

  • memory/344-133-0x00000000000E0000-0x00000000000E1000-memory.dmp
    Filesize

    4KB

  • memory/344-132-0x0000000000DB0000-0x0000000000E9B000-memory.dmp
    Filesize

    940KB

  • memory/344-129-0x0000000000510000-0x000000000055D000-memory.dmp
    Filesize

    308KB

  • memory/344-128-0x00000000779B0000-0x0000000077B59000-memory.dmp
    Filesize

    1.7MB

  • memory/2060-113-0x0000000074920000-0x0000000074A94000-memory.dmp
    Filesize

    1.5MB

  • memory/2060-114-0x0000000074920000-0x0000000074A94000-memory.dmp
    Filesize

    1.5MB

  • memory/2060-112-0x00000000779B0000-0x0000000077B59000-memory.dmp
    Filesize

    1.7MB

  • memory/2060-111-0x0000000074920000-0x0000000074A94000-memory.dmp
    Filesize

    1.5MB

  • memory/2060-104-0x0000000000400000-0x000000000081A000-memory.dmp
    Filesize

    4.1MB

  • memory/2800-121-0x0000000074920000-0x0000000074A94000-memory.dmp
    Filesize

    1.5MB

  • memory/2800-120-0x0000000074920000-0x0000000074A94000-memory.dmp
    Filesize

    1.5MB

  • memory/2800-126-0x0000000074920000-0x0000000074A94000-memory.dmp
    Filesize

    1.5MB

  • memory/2800-118-0x00000000779B0000-0x0000000077B59000-memory.dmp
    Filesize

    1.7MB

  • memory/2800-116-0x0000000074920000-0x0000000074A94000-memory.dmp
    Filesize

    1.5MB