Analysis

  • max time kernel
    40s
  • max time network
    46s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 16:13

General

  • Target

    overemptiness.exe

  • Size

    18.8MB

  • MD5

    8d6910b4e8e10febdcd363d5f436485f

  • SHA1

    ffd58b7027338ea88717f240c1ac131504b3ce5f

  • SHA256

    01ee8f74dace7c4cec68e020350e1b6637b5f6fd36c4afd2e62a41d2056db304

  • SHA512

    736dfa4cb021646b6eb61076ac34d622ddb25a5d90296f5c6fe602053aee5f118f564c45675d72aa824007c06d9e275baed94ca347de94455688e7aa53aa3d45

  • SSDEEP

    393216:5t8c7Ej86oji7W9IFdUDWjfLb4QD4NT9L6lDEoXMeBb4tFRAC1/gb:5t8mK86SeDQofQKiTN6lDEoUjRp1

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\overemptiness.exe
    "C:\Users\Admin\AppData\Local\Temp\overemptiness.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:5008
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c cls
        2⤵
          PID:4964
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C tzutil /s "W. Europe Standard Time"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1160
          • C:\Windows\system32\tzutil.exe
            tzutil /s "W. Europe Standard Time"
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4332
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c cls
          2⤵
            PID:2608
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c cls
            2⤵
              PID:2796
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c cd "C:\Users\Admin\AppData\Local\Temp"
              2⤵
                PID:1684
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c takeown /F %systemroot%\System32\MSAudDecMFT.dll
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1564
                • C:\Windows\system32\takeown.exe
                  takeown /F C:\Windows\System32\MSAudDecMFT.dll
                  3⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1708
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c icacls %systemroot%\System32\MSAudDecMFT.dll /grant "%username%":F
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2196
                • C:\Windows\system32\icacls.exe
                  icacls C:\Windows\System32\MSAudDecMFT.dll /grant "Admin":F
                  3⤵
                  • Possible privilege escalation attempt
                  • Modifies file permissions
                  PID:3008
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c del %systemroot%\System32\MSAudDecMFT.dll
                2⤵
                  PID:2216
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c del /f /Q %systemroot%\System32\MSAudDecMFT.dll
                  2⤵
                    PID:4304
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C takeown /F %systemroot%\System32\MSAudDecMFT.dll
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1808
                    • C:\Windows\system32\takeown.exe
                      takeown /F C:\Windows\System32\MSAudDecMFT.dll
                      3⤵
                      • Possible privilege escalation attempt
                      • Modifies file permissions
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4856
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C icacls %systemroot%\System32\MSAudDecMFT.dll /grant "%username%":F
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1392
                    • C:\Windows\system32\icacls.exe
                      icacls C:\Windows\System32\MSAudDecMFT.dll /grant "Admin":F
                      3⤵
                      • Possible privilege escalation attempt
                      • Modifies file permissions
                      PID:928
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C del %systemroot%\System32\MSAudDecMFT.dll
                    2⤵
                      PID:4708
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C del /f /Q %systemroot%\System32\MSAudDecMFT.dll
                      2⤵
                        PID:1052
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c cls
                        2⤵
                          PID:3804
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c cls
                          2⤵
                            PID:1036
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c cls
                            2⤵
                              PID:4404

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • memory/3028-0-0x00000001411C3000-0x0000000141F13000-memory.dmp

                            Filesize

                            13.3MB

                          • memory/3028-1-0x00007FFFF6EB0000-0x00007FFFF6EB2000-memory.dmp

                            Filesize

                            8KB

                          • memory/3028-2-0x0000000140000000-0x00000001431D9000-memory.dmp

                            Filesize

                            49.8MB

                          • memory/3028-3-0x0000000140000000-0x00000001431D9000-memory.dmp

                            Filesize

                            49.8MB