Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 10:39

General

  • Target

    4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe

  • Size

    2.7MB

  • MD5

    7a09c18527253aef3889cd14d036f4dc

  • SHA1

    e751c0c5bded024beed87e9ecca48b993aa86132

  • SHA256

    4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af

  • SHA512

    18c60ceb54997b39a57e64de2d4f8d665307a4656f5b197cb996fa9bcd0ad74d4731090ff9d567f09818e706c8bec2abc242c3a49a908642e9fde1a586862f3c

  • SSDEEP

    49152:CWBj/cjFA0c4mB5jR8MXfS1gjxk6MGQI3fScAi4G0P8teFMFccZ:McSMeg2/S14x/FMOI

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe
    "C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c set
      2⤵
        PID:1604
      • C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe
        PECMD**pecmd-cmd* PUTF -dd -skipb=992256 -len=1794721 "C:\Users\Admin\AppData\Local\Temp\~8528266711000047943.tmp",,C:\Users\Admin\AppData\Local\Temp\4eff3bf2a6b47bfe6819d129664ce887b59897589870db94c3058a6f200535af.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2116
      • C:\Users\Admin\AppData\Local\Temp\~3399468933783304159~\sg.tmp
        7zG_exe x "C:\Users\Admin\AppData\Local\Temp\~8528266711000047943.tmp" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\CleanTemp"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:860
      • C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe
        "C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3120
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe /c set
          3⤵
            PID:2696
          • C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe
            PECMD**pecmd-cmd* PUTF -dd -skipb=992256 -len=323825 "C:\Users\Admin\AppData\Local\Temp\~6986566738483976704.tmp",,C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:3008
          • C:\Users\Admin\AppData\Local\Temp\~5060108065255324345~\sg.tmp
            7zG_exe x "C:\Users\Admin\AppData\Local\Temp\~6986566738483976704.tmp" -y -aos -o"C:\Windows"
            3⤵
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            PID:2056
          • C:\Windows\CleanTemp.exe
            "C:\Windows\CleanTemp.exe"
            3⤵
            • Modifies WinLogon for persistence
            • Executes dropped EXE
            • Modifies Internet Explorer settings
            • Modifies Internet Explorer start page
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1344
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c rd /s /q "%USERPROFILE%\AppData\Local\Temp"
              4⤵
                PID:1524
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c rd /s /q "%USERPROFILE%\AppData\Local\Temp"
                4⤵
                  PID:2752
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache"
                  4⤵
                    PID:1920
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c rd /s /q "%USERPROFILE%\AppData\Local\Microsoft\Windows\INetCache"
                    4⤵
                      PID:716

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\CLEANT~1\CLEANT~1.EXE

                Filesize

                1.3MB

                MD5

                db451afc8f2dea22e0d49bd076bb304a

                SHA1

                ffabf0a1748c583457da493e61baab486e970ae1

                SHA256

                6afce61f2ba18cee2a5ce204d10c006f5f50b497c3b54616cbe8762077c54400

                SHA512

                0b6be6143dbf1d859c6b61f2564166aa6a2a7b471e039c85614d010fae3c4d3903acf0749e709ee4bc05bd4dca47f683453691238fd41218492655cb6513b8a1

              • C:\Users\Admin\AppData\Local\Temp\CleanTemp\CleanTemp64.exe

                Filesize

                1.3MB

                MD5

                381dcd0f69d0262cac902f14b2761e10

                SHA1

                30c05bdaef2b05a24b20aea8d24308ee8e0c323a

                SHA256

                5f51505242592d9d8c0d2419f96c3cdf56676f01f06333ea8bed54a4f9b2728b

                SHA512

                426156e60533b6af3104ff429179fbb6279729922dd9f3198d1220157b56ea2f6627d1dc3506fed5f9176c7186862c468745c9d56f8174570c6af991e3aeacba

              • C:\Users\Admin\AppData\Local\Temp\~3399468933783304159~\sg.tmp

                Filesize

                715KB

                MD5

                7c4718943bd3f66ebdb47ccca72c7b1e

                SHA1

                f9edfaa7adb8fa528b2e61b2b251f18da10a6969

                SHA256

                4cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc

                SHA512

                e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516

              • C:\Users\Admin\AppData\Local\Temp\~6986566738483976704.tmp

                Filesize

                316KB

                MD5

                aff3a05583a5e932acb381963ae9a8eb

                SHA1

                b98ae67d2fea845f676448417fe99feea91949bf

                SHA256

                3a92e844169baea0a76a62f04b7e261f00ea7ac99bcc4ac1373dfd032bc19fef

                SHA512

                f976b12317e9097a54f19b6b2a264bddc60c55936f97ed5baed9965e580f9a07d62a5a47b696b5f73432d6de10e6d272d5e496e5e45cbc0c1820cb9c73d8b867

              • C:\Users\Admin\AppData\Local\Temp\~8528266711000047943.tmp

                Filesize

                1.7MB

                MD5

                cf29f292833a8ea8d29e7af680ea39c3

                SHA1

                a52dd7ab84b58a6057d29b7636f9804fbef7122d

                SHA256

                499c8cd9377e1d02d173102dfca53258a27bc79420d1e0b78e3a92a1079780b7

                SHA512

                da6a0567658c7917b9680120b3209ba363a05d0e9f7f324990556b86c36d9b20fd925446854957989f6632030a80db76f00bd2b517e7a94dbfaa202d340f9811

              • C:\Users\Admin\AppData\Local\Temp\~~2300057735828115293.tmp

                Filesize

                135B

                MD5

                f36df2253a25fa93328c414ea6465e76

                SHA1

                bcbf8efef835f0d1675185b35f12355a5e3df900

                SHA256

                0951df47f9436996d4416bc3cea78ee7a9d546091f752d90521ba8403dc9fa8f

                SHA512

                29fa662fcda73ace6bb59cfd925c483f34fbe0462aa0fca632be72bda633b6478cb53b6fbbe736ed941580beb7fb8719246a3120009b7dc1778b83896d9c9ea9

              • C:\Users\Admin\AppData\Local\Temp\~~4035621277712131085.tmp

                Filesize

                143B

                MD5

                a986dd59d1791d23fe12c212f9841986

                SHA1

                098ecbb2a59de11712b920dc17572f1426ffeadc

                SHA256

                4c99f0fcd1b4cceb529dd0f573d07a95f68eab644bde63bd5b7269a6fe46305e

                SHA512

                54b8382a72dd52362fa307cbf54ec32e1319a18ea85af4937055dd45407b1d4f1de80b23ac6990b83f52b85a8728aa38cd4add1fca9c39127265e6df090c1716

              • C:\Windows\CleanTemp.exe

                Filesize

                337KB

                MD5

                2aea8c280c0a0ffd00ee7feb3c041c3f

                SHA1

                1d1c5e4a3b027fa91bb13dfdca555d193bb30439

                SHA256

                3aedd982d3efee614853797ee7befd31d5d3fe1f3e816bc7bbe467201f62ab9b

                SHA512

                062ef76f035f3a628de82392761cada616d8d4f5c605b4d69fb9f34bb07dfbc75967da919e33d2f97cc89fc5aed0c2fbb7618c377e9d98c5effea25cecf16d39

              • memory/1344-53-0x0000000140000000-0x00000001400EC000-memory.dmp

                Filesize

                944KB

              • memory/1344-56-0x0000000140000000-0x00000001400EC000-memory.dmp

                Filesize

                944KB

              • memory/2116-8-0x0000000000400000-0x0000000000573000-memory.dmp

                Filesize

                1.4MB

              • memory/3008-35-0x0000000000400000-0x0000000000573000-memory.dmp

                Filesize

                1.4MB

              • memory/3008-37-0x0000000000400000-0x0000000000573000-memory.dmp

                Filesize

                1.4MB

              • memory/3120-25-0x0000000000400000-0x0000000000573000-memory.dmp

                Filesize

                1.4MB

              • memory/3120-58-0x0000000000400000-0x0000000000573000-memory.dmp

                Filesize

                1.4MB

              • memory/4508-0-0x0000000000400000-0x0000000000573000-memory.dmp

                Filesize

                1.4MB

              • memory/4508-59-0x0000000000400000-0x0000000000573000-memory.dmp

                Filesize

                1.4MB