Resubmissions

12/06/2024, 21:30

240612-1chbsa1dkh 10

12/06/2024, 21:28

240612-1bqlrsvcrn 10

12/06/2024, 21:25

240612-z92ags1cld 10

Analysis

  • max time kernel
    210s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    12/06/2024, 21:25

General

  • Target

    папапвси.exe

  • Size

    93KB

  • MD5

    10f15e3bc5962457f7584d5112191426

  • SHA1

    d3e03852158106b2cb43e2e59317e9c33ffdbbf4

  • SHA256

    3d6b9606be8daa8b65fb7bb8aa93cc63325599f581883da8591cf092f75c848a

  • SHA512

    892f0fa0b0909334ef70fcf2ab274944174c7e158ea0e5dc652e9e2942d2de0676ea78116b53a95357043cec8d2ca06d9f9fda0b4123684c17f31657b316145e

  • SSDEEP

    1536:8UhSyh6zaoFjuFCVR5jEwzGi1dDtDlgS:8UKzaujuCRWi1dJy

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\папапвси.exe
    "C:\Users\Admin\AppData\Local\Temp\папапвси.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\server.exe
      "C:\Windows\server.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Windows\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:2608
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2752
    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Program Files (x86)\Windows Media Player\setup_wm.exe
        "C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
        2⤵
          PID:2120

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmp91517.WMC\allservices.xml

        Filesize

        546B

        MD5

        df03e65b8e082f24dab09c57bc9c6241

        SHA1

        6b0dacbf38744c9a381830e6a5dc4c71bd7cedbf

        SHA256

        155b9c588061c71832af329fafa5678835d9153b8fbb7592195ae953d0c455ba

        SHA512

        ef1cc8d27fbc5da5daab854c933d3914b84ee539d4d2f0126dc1a04a830c5599e39a923c80257653638b1b99b0073a7174cc164be5887181730883c752ba2f99

      • C:\Users\Admin\AppData\Roaming\app

        Filesize

        5B

        MD5

        311d687faffaed10f44ea27c024986b6

        SHA1

        eece910ea8cb7aed467e2e7700f7c223d3fbbc9e

        SHA256

        608547d80bf0e4b3d9cfffd324702b4aa38db2f0bfb3db4bd517b556fdf4de2b

        SHA512

        296d2cbbbf39917b174682a73e571a98130b2fe1c2dcb7c84adbd185a0b3a81384ad556e3a88cdeaa01fbd5cb486c58c1e1dff22f77cd3e9df7315b93355272b

      • C:\Windows\server.exe

        Filesize

        93KB

        MD5

        10f15e3bc5962457f7584d5112191426

        SHA1

        d3e03852158106b2cb43e2e59317e9c33ffdbbf4

        SHA256

        3d6b9606be8daa8b65fb7bb8aa93cc63325599f581883da8591cf092f75c848a

        SHA512

        892f0fa0b0909334ef70fcf2ab274944174c7e158ea0e5dc652e9e2942d2de0676ea78116b53a95357043cec8d2ca06d9f9fda0b4123684c17f31657b316145e

      • memory/2016-0-0x0000000074661000-0x0000000074662000-memory.dmp

        Filesize

        4KB

      • memory/2016-1-0x0000000074660000-0x0000000074C0B000-memory.dmp

        Filesize

        5.7MB

      • memory/2016-2-0x0000000074660000-0x0000000074C0B000-memory.dmp

        Filesize

        5.7MB

      • memory/2016-12-0x0000000074660000-0x0000000074C0B000-memory.dmp

        Filesize

        5.7MB

      • memory/2068-13-0x0000000074660000-0x0000000074C0B000-memory.dmp

        Filesize

        5.7MB

      • memory/2068-14-0x0000000074660000-0x0000000074C0B000-memory.dmp

        Filesize

        5.7MB

      • memory/2068-15-0x0000000074660000-0x0000000074C0B000-memory.dmp

        Filesize

        5.7MB

      • memory/2068-19-0x0000000074660000-0x0000000074C0B000-memory.dmp

        Filesize

        5.7MB