Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2024, 10:39

General

  • Target

    4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe

  • Size

    2.7MB

  • MD5

    7a09c18527253aef3889cd14d036f4dc

  • SHA1

    e751c0c5bded024beed87e9ecca48b993aa86132

  • SHA256

    4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af

  • SHA512

    18c60ceb54997b39a57e64de2d4f8d665307a4656f5b197cb996fa9bcd0ad74d4731090ff9d567f09818e706c8bec2abc242c3a49a908642e9fde1a586862f3c

  • SSDEEP

    49152:CWBj/cjFA0c4mB5jR8MXfS1gjxk6MGQI3fScAi4G0P8teFMFccZ:McSMeg2/S14x/FMOI

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe
    "C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\system32\cmd.exe
      cmd.exe /c set
      2⤵
        PID:3040
      • C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe
        PECMD**pecmd-cmd* PUTF -dd -skipb=992256 -len=1794721 "C:\Users\Admin\AppData\Local\Temp\~5292991173600089339.tmp",,C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3060
      • C:\Users\Admin\AppData\Local\Temp\~3720215328816290936~\sg.tmp
        7zG_exe x "C:\Users\Admin\AppData\Local\Temp\~5292991173600089339.tmp" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\CleanTemp"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2580
      • C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe
        "C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Windows\system32\cmd.exe
          cmd.exe /c set
          3⤵
            PID:2460
          • C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe
            PECMD**pecmd-cmd* PUTF -dd -skipb=992256 -len=323825 "C:\Users\Admin\AppData\Local\Temp\~3682341367909827186.tmp",,C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2372
          • C:\Users\Admin\AppData\Local\Temp\~1596585646439773763~\sg.tmp
            7zG_exe x "C:\Users\Admin\AppData\Local\Temp\~3682341367909827186.tmp" -y -aos -o"C:\Windows"
            3⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            PID:2568
          • C:\Windows\CleanTemp.exe
            "C:\Windows\CleanTemp.exe"
            3⤵
            • Modifies WinLogon for persistence
            • Executes dropped EXE
            • Modifies Internet Explorer settings
            • Modifies Internet Explorer start page
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1340
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c rd /s /q "%USERPROFILE%\AppData\Local\Temp"
              4⤵
                PID:1864
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c rd /s /q "%USERPROFILE%\AppData\Local\Temp"
                4⤵
                  PID:1552
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files"
                  4⤵
                    PID:2440
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c rd /s /q "%USERPROFILE%\AppData\Local\Microsoft\Windows\Temporary Internet Files"
                    4⤵
                      PID:2680

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\CLEANT~1\CLEANT~1.EXE

                      Filesize

                      1.3MB

                      MD5

                      db451afc8f2dea22e0d49bd076bb304a

                      SHA1

                      ffabf0a1748c583457da493e61baab486e970ae1

                      SHA256

                      6afce61f2ba18cee2a5ce204d10c006f5f50b497c3b54616cbe8762077c54400

                      SHA512

                      0b6be6143dbf1d859c6b61f2564166aa6a2a7b471e039c85614d010fae3c4d3903acf0749e709ee4bc05bd4dca47f683453691238fd41218492655cb6513b8a1

                    • C:\Users\Admin\AppData\Local\Temp\~3682341367909827186.tmp

                      Filesize

                      316KB

                      MD5

                      aff3a05583a5e932acb381963ae9a8eb

                      SHA1

                      b98ae67d2fea845f676448417fe99feea91949bf

                      SHA256

                      3a92e844169baea0a76a62f04b7e261f00ea7ac99bcc4ac1373dfd032bc19fef

                      SHA512

                      f976b12317e9097a54f19b6b2a264bddc60c55936f97ed5baed9965e580f9a07d62a5a47b696b5f73432d6de10e6d272d5e496e5e45cbc0c1820cb9c73d8b867

                    • C:\Users\Admin\AppData\Local\Temp\~5292991173600089339.tmp

                      Filesize

                      1.7MB

                      MD5

                      cf29f292833a8ea8d29e7af680ea39c3

                      SHA1

                      a52dd7ab84b58a6057d29b7636f9804fbef7122d

                      SHA256

                      499c8cd9377e1d02d173102dfca53258a27bc79420d1e0b78e3a92a1079780b7

                      SHA512

                      da6a0567658c7917b9680120b3209ba363a05d0e9f7f324990556b86c36d9b20fd925446854957989f6632030a80db76f00bd2b517e7a94dbfaa202d340f9811

                    • C:\Windows\CleanTemp.exe

                      Filesize

                      337KB

                      MD5

                      2aea8c280c0a0ffd00ee7feb3c041c3f

                      SHA1

                      1d1c5e4a3b027fa91bb13dfdca555d193bb30439

                      SHA256

                      3aedd982d3efee614853797ee7befd31d5d3fe1f3e816bc7bbe467201f62ab9b

                      SHA512

                      062ef76f035f3a628de82392761cada616d8d4f5c605b4d69fb9f34bb07dfbc75967da919e33d2f97cc89fc5aed0c2fbb7618c377e9d98c5effea25cecf16d39

                    • \Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe

                      Filesize

                      1.3MB

                      MD5

                      381dcd0f69d0262cac902f14b2761e10

                      SHA1

                      30c05bdaef2b05a24b20aea8d24308ee8e0c323a

                      SHA256

                      5f51505242592d9d8c0d2419f96c3cdf56676f01f06333ea8bed54a4f9b2728b

                      SHA512

                      426156e60533b6af3104ff429179fbb6279729922dd9f3198d1220157b56ea2f6627d1dc3506fed5f9176c7186862c468745c9d56f8174570c6af991e3aeacba

                    • \Users\Admin\AppData\Local\Temp\~3720215328816290936~\sg.tmp

                      Filesize

                      715KB

                      MD5

                      7c4718943bd3f66ebdb47ccca72c7b1e

                      SHA1

                      f9edfaa7adb8fa528b2e61b2b251f18da10a6969

                      SHA256

                      4cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc

                      SHA512

                      e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516

                    • memory/1340-62-0x0000000140000000-0x00000001400EC000-memory.dmp

                      Filesize

                      944KB

                    • memory/1340-64-0x0000000140000000-0x00000001400EC000-memory.dmp

                      Filesize

                      944KB

                    • memory/2372-41-0x0000000000400000-0x0000000000573000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/2372-44-0x0000000000400000-0x0000000000573000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/2492-65-0x0000000000400000-0x0000000000573000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/2492-31-0x0000000000400000-0x0000000000573000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/2492-40-0x00000000025D0000-0x0000000002743000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/2492-61-0x0000000002EE0000-0x0000000002FCC000-memory.dmp

                      Filesize

                      944KB

                    • memory/2888-0-0x0000000000400000-0x0000000000573000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/2888-29-0x0000000002F30000-0x00000000030A3000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/2888-66-0x0000000000400000-0x0000000000573000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/3060-10-0x0000000000400000-0x0000000000573000-memory.dmp

                      Filesize

                      1.4MB

                    • memory/3060-7-0x0000000000400000-0x0000000000573000-memory.dmp

                      Filesize

                      1.4MB