Analysis

  • max time kernel
    135s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 16:37

General

  • Target

    Server.exe

  • Size

    76KB

  • MD5

    9ca0dca75c4d1c1453d5ab26a86d85c2

  • SHA1

    c85a55c7c628231beb5f8d6a32e75646c1dc7348

  • SHA256

    1adc4f1c7e5cd29791e074dd27ef5bb4e6a9c14b5d8def6a4aa4d5d0e5c58fe6

  • SHA512

    88efd5b1f70beceff4f99ca9834b80318ccde6ed1fe30c39de7d494e4b0b5bf00dcf52ffdc19e032367b076be53d1f18a9a9dbf1f26648e095375dec653a27ed

  • SSDEEP

    1536:sjAsQye1NzY5wv3KxquaqjmRLxSXzZpozkZDt9g7:H9ye1NzYzVaqSRLxgNp5Zj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Server.exe
    "C:\Users\Admin\AppData\Local\Temp\Server.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Users\Admin\AppData\Roaming\Microsoft\Svchost.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Svchost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2548

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\mlt.tmp
    Filesize

    44B

    MD5

    5389b11510f65424863e2e9724bd65e4

    SHA1

    071102005e3217b50283b71ee33858bb15606549

    SHA256

    fecb0cdb9664c0c83a84dff897fecff3773df1d4d5a6fc5c84e2187027315fa7

    SHA512

    ba78a6c2619bd7a4d4428a5b0b739e109dfa9ddb8925a005067f8b7091744bd9e16e007d32f62ae42768f3f45fb8aefe496f5a3ef617862127b53a88f86514ff

  • \Users\Admin\AppData\Roaming\Microsoft\Svchost.exe
    Filesize

    76KB

    MD5

    9ca0dca75c4d1c1453d5ab26a86d85c2

    SHA1

    c85a55c7c628231beb5f8d6a32e75646c1dc7348

    SHA256

    1adc4f1c7e5cd29791e074dd27ef5bb4e6a9c14b5d8def6a4aa4d5d0e5c58fe6

    SHA512

    88efd5b1f70beceff4f99ca9834b80318ccde6ed1fe30c39de7d494e4b0b5bf00dcf52ffdc19e032367b076be53d1f18a9a9dbf1f26648e095375dec653a27ed

  • memory/1540-0-0x0000000074D41000-0x0000000074D42000-memory.dmp
    Filesize

    4KB

  • memory/1540-1-0x0000000074D40000-0x00000000752EB000-memory.dmp
    Filesize

    5.7MB

  • memory/1540-2-0x0000000074D40000-0x00000000752EB000-memory.dmp
    Filesize

    5.7MB

  • memory/1540-14-0x0000000074D40000-0x00000000752EB000-memory.dmp
    Filesize

    5.7MB

  • memory/2548-15-0x0000000074D40000-0x00000000752EB000-memory.dmp
    Filesize

    5.7MB

  • memory/2548-16-0x0000000074D40000-0x00000000752EB000-memory.dmp
    Filesize

    5.7MB

  • memory/2548-18-0x0000000074D40000-0x00000000752EB000-memory.dmp
    Filesize

    5.7MB

  • memory/2548-19-0x0000000074D40000-0x00000000752EB000-memory.dmp
    Filesize

    5.7MB

  • memory/2548-20-0x0000000074D40000-0x00000000752EB000-memory.dmp
    Filesize

    5.7MB