Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-06-2024 10:11

General

  • Target

    1f68f87b6dd86ca34d769c0ba74d97c0b2ba868198a7d632070d24b585f25f52.exe

  • Size

    6.4MB

  • MD5

    222ae73510057464ddf4c399d299bacb

  • SHA1

    dfe08f92d5cf7eb946ee8b6ee59fc9a4d4c234be

  • SHA256

    1f68f87b6dd86ca34d769c0ba74d97c0b2ba868198a7d632070d24b585f25f52

  • SHA512

    c5c968602312e27e74edd2963e47307824566bd7f55e7f801dacfd4db975a80f02378e6a2b1dd721670d74726e84d454e3b742f200a08b72233bb8565e95044e

  • SSDEEP

    98304:abPYi4+r4ubGpQT7hdBjEVHE7OBP0MftJBAUZLq:W4A4RQOBMMlJV2

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f68f87b6dd86ca34d769c0ba74d97c0b2ba868198a7d632070d24b585f25f52.exe
    "C:\Users\Admin\AppData\Local\Temp\1f68f87b6dd86ca34d769c0ba74d97c0b2ba868198a7d632070d24b585f25f52.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\\restart.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:428
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im ╢╢═├═├.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4496
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\\restart.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Windows\SysWOW64\taskkill.exe
        Taskkill /f /im ╢╢═├═├.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4756
      • C:\Windows\SysWOW64\taskkill.exe
        Taskkill /f /im .cache_╢╢═├═├.exe
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\HPSocket4C.dll

    Filesize

    2.1MB

    MD5

    04869ada712c189caba4822be0e81ea5

    SHA1

    9c45486b30e6d3ccf0737c5766796baaf58232ab

    SHA256

    23078015adb0cf53ebf632a895a1a224b3718174e6c2887e1bbb2d28be5e2b8b

    SHA512

    16f98af15583c60da0cb947ea2230f759bfa27f86ef93ef5f7ffe2adcec6c5f115f52ffa74bae6cf8add94bb6a380fa276f391619256be7a45c53bb7421fdd9c

  • C:\Users\Admin\AppData\Local\Temp\restart.bat

    Filesize

    92B

    MD5

    6789c01ef17152224e1dadce89ebc364

    SHA1

    1a72865012ad8cfeba5a391ad046339a44fc9a57

    SHA256

    5b4f8879fa51c430abaaa94094fe82e22c0912881f961219d9b0805446a09412

    SHA512

    5b4de797295e23a1e8934c551375ebb1335a3dcdd7ad8e0c7baeb0fc2fe2f7d41bcd75b8f40cbb6943a098001ee076f4acd05005559d98c286fce7535b6974d6

  • C:\Users\Admin\AppData\Local\Temp\restart.bat

    Filesize

    145B

    MD5

    96785a2f7e2fa7a92132cb9843b7b1cd

    SHA1

    b677d2d5a7b8c28850d15ca2c184b71b8eb6d651

    SHA256

    1c7838fe63f9564636489704d817fa44a034d9487adc54f400f056c06bacaaed

    SHA512

    ec789081a28c4e5529ae0bb15fd8e1426e8bd46ea970be689e6f42ca2181ad702b1029c6c4ca7d2ecd23217170281ac0a245ac96b472919d22c8d3574dca2dae

  • memory/5100-2-0x0000000004EA0000-0x0000000004EA1000-memory.dmp

    Filesize

    4KB

  • memory/5100-3-0x0000000004E90000-0x0000000004E91000-memory.dmp

    Filesize

    4KB