Analysis

  • max time kernel
    131s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2024, 03:00

General

  • Target

    47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe

  • Size

    32KB

  • MD5

    f5fca1b178af87bd48c7ea9e3f2c957b

  • SHA1

    7a58fc9a14a7c4c0abaa8d9bae5d69e74a19762d

  • SHA256

    47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399

  • SHA512

    6ce8ee0ce49e2058aee2c0557e8ab6c1250dcefc4e8b4e451a07fb990a01051f8e0a5fb468f1d9b61b523ac481eaba11e501e2e5b45b2775a1be4428bca7cb37

  • SSDEEP

    384:wnlkJzAQeFTaSO1CoRWQDwyErOfeYVTDj95Ssz95:wnlRbFm5AoR3XVTDj955z95

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Discovers systems in the same network 1 TTPs 2 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe
    "C:\Users\Admin\AppData\Local\Temp\47e9917ce0afc96632db5e95db2fd9aff10d05b0399fd05d02035eacb3c1f399.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3552
    • C:\Windows\System32\cmd.exe
      /c ipconfig /all
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3284
      • C:\Windows\system32\ipconfig.exe
        ipconfig /all
        3⤵
        • Gathers network information
        PID:3768
    • C:\Windows\System32\cmd.exe
      /c systeminfo
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Windows\system32\systeminfo.exe
        systeminfo
        3⤵
        • Gathers system information
        PID:3084
    • C:\Windows\System32\cmd.exe
      /c nltest /domain_trusts
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4668
      • C:\Windows\system32\nltest.exe
        nltest /domain_trusts
        3⤵
          PID:3140
      • C:\Windows\System32\cmd.exe
        /c nltest /domain_trusts /all_trusts
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4652
        • C:\Windows\system32\nltest.exe
          nltest /domain_trusts /all_trusts
          3⤵
            PID:2236
        • C:\Windows\System32\cmd.exe
          /c net view /all /domain
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1832
          • C:\Windows\system32\net.exe
            net view /all /domain
            3⤵
            • Discovers systems in the same network
            PID:1432
        • C:\Windows\System32\cmd.exe
          /c net view /all
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:5048
          • C:\Windows\system32\net.exe
            net view /all
            3⤵
            • Discovers systems in the same network
            PID:3420
        • C:\Windows\System32\cmd.exe
          /c net group "Domain Admins" /domain
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3100
          • C:\Windows\system32\net.exe
            net group "Domain Admins" /domain
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4232
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 group "Domain Admins" /domain
              4⤵
                PID:2712
          • C:\Windows\System32\wbem\wmic.exe
            /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get * /Format:List
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4616
          • C:\Windows\System32\cmd.exe
            /c net config workstation
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2192
            • C:\Windows\system32\net.exe
              net config workstation
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:5024
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 config workstation
                4⤵
                  PID:212
            • C:\Windows\System32\cmd.exe
              /c wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName | findstr /V /B /C:displayName || echo No Antivirus installed
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3384
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2388
              • C:\Windows\system32\findstr.exe
                findstr /V /B /C:displayName
                3⤵
                  PID:4476
              • C:\Windows\System32\cmd.exe
                /c whoami /groups
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2140
                • C:\Windows\system32\whoami.exe
                  whoami /groups
                  3⤵
                    PID:4972

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads