Resubmissions

03/07/2024, 15:25

240703-stqqgswapb 3

03/07/2024, 15:19

240703-sqgy6svfqh 3

Analysis

  • max time kernel
    39s
  • max time network
    42s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    03/07/2024, 15:19

General

  • Target

    ExecutableScriptsLabel.exe

  • Size

    36.1MB

  • MD5

    65f340057b5ecd866c624f3c93a33c61

  • SHA1

    32c66b6bda9eeb80421268ef460545ed3cdaeab8

  • SHA256

    c061c96731078f03bfee42a84070cd6f4319a99e2eb17c3e730967152646b570

  • SHA512

    8fce464f5a1620451c26ebc817810bf6000f61d47409bd8e5c4b91c8c7552ceea9aeb1ffa11d531cf65ecc96f6e67ff9b9cfeef09464b563314c1cff2b0c3dde

  • SSDEEP

    393216:f1Du8BtuBw2FEL3Z3aLUoQvo6LP/SgbSpYvKEh1EdKwlGQKPJuGsiTfREsrgCYfp:fMguj8Q4Vfv0qFTrYH

Score
1/10

Malware Config

Signatures

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ExecutableScriptsLabel.exe
    "C:\Users\Admin\AppData\Local\Temp\ExecutableScriptsLabel.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Windows\system32\cmd.exe
      cmd.exe /C call C:\Users\Admin\AppData\Local\Temp\ad01e643dfb1e68e9480973cafc758b1.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4072
      • C:\Windows\system32\findstr.exe
        findstr /i "echo" "C:\Users\Admin\AppData\Local\Temp\ad01e643dfb1e68e9480973cafc758b1.bat"
        3⤵
          PID:4548
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell "$d = wmic diskdrive get model;if ($d -like '*DADY HARDDISK*' -or $d -like '*QEMU HARDDISK*') { taskkill /f /im cmd.exe }"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2988
          • C:\Windows\System32\Wbem\WMIC.exe
            "C:\Windows\System32\Wbem\WMIC.exe" diskdrive get model
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1184
          • C:\Windows\system32\taskkill.exe
            "C:\Windows\system32\taskkill.exe" /f /im cmd.exe
            4⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1028

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qwpcp1el.qrr.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\ad01e643dfb1e68e9480973cafc758b1.bat

      Filesize

      3.4MB

      MD5

      5eb1a9aaf85061d289df8c1365162da1

      SHA1

      4ecda126d9d5c4a95404cefeb978bf34fb5b4c4b

      SHA256

      3f2fa9af7417b0a5f96b91cb957a5e60ff48f8f554c60a114a000ef5fe90fafe

      SHA512

      fea9efa4f3ffec4cfc2cb97939e5ef6a753a57f01ce16f81add7a4286bab3672ab645f230b613e5d104ae35d66371e20a538582bbaf933626cc57831f0b10b36

    • C:\Users\Admin\AppData\Local\Temp\kdotNFDkQn.bat

      Filesize

      199B

      MD5

      aac1be3594c6c387fc97e3175e3f4c10

      SHA1

      46e4e5ac11b012b7e2dfd11937bb0642e7f6d000

      SHA256

      f1d34cb18c7256a00fbb1f1d311ca987cb785c772856e87b1e9a8f235946a12d

      SHA512

      0ea2a02ff22f98b69efb6e8912803577d5d029abdb04da3d7cc2473e8351e2524ab7fbfe9aa79889b3f9bad13f09a6d3dab61863cad069b6894132138dbf01ee

    • memory/2988-14-0x00007FFE17283000-0x00007FFE17285000-memory.dmp

      Filesize

      8KB

    • memory/2988-23-0x000001ED9DFF0000-0x000001ED9E012000-memory.dmp

      Filesize

      136KB

    • memory/2988-24-0x00007FFE17280000-0x00007FFE17D42000-memory.dmp

      Filesize

      10.8MB

    • memory/2988-25-0x00007FFE17280000-0x00007FFE17D42000-memory.dmp

      Filesize

      10.8MB

    • memory/2988-26-0x00007FFE17280000-0x00007FFE17D42000-memory.dmp

      Filesize

      10.8MB

    • memory/2988-29-0x00007FFE17280000-0x00007FFE17D42000-memory.dmp

      Filesize

      10.8MB