Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2024, 04:05

General

  • Target

    3c062530df6958696a802d10b99f185e6947fc886f3b118882fd47395758c6ea.exe

  • Size

    482KB

  • MD5

    ffcc7c1a258c7f0f19334aed541d5e60

  • SHA1

    fb60171569c88963d3c7b07acc614741fec32a0e

  • SHA256

    3c062530df6958696a802d10b99f185e6947fc886f3b118882fd47395758c6ea

  • SHA512

    e25b3721cae0c8cda3c1e6d841f021978ee147515c7e91e46fd0d17659c5b09da58767ae7b3e836c43e891820e751c0a3c81e3b35a3a8b627e21186109b7628b

  • SSDEEP

    12288:Xflc87eqqV5e+wBV6O+5Qt+D66oGt3e/GDBQKy+zHC7/lpd:XfSqqHeVBx1QW6oO3eyBo+ylpd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\3c062530df6958696a802d10b99f185e6947fc886f3b118882fd47395758c6ea.exe
      "C:\Users\Admin\AppData\Local\Temp\3c062530df6958696a802d10b99f185e6947fc886f3b118882fd47395758c6ea.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Users\Admin\AppData\Roaming\cmdk_ssp\fontocom.exe
        "C:\Users\Admin\AppData\Roaming\cmdk_ssp"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2416
        • C:\Users\Admin\AppData\Local\Temp\~344A.tmp
          1224 494088 2416 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2156
  • C:\Windows\SysWOW64\MRINetup.exe
    C:\Windows\SysWOW64\MRINetup.exe -s
    1⤵
    • Executes dropped EXE
    PID:1304

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\~344A.tmp

          Filesize

          8KB

          MD5

          86dc243576cf5c7445451af37631eea9

          SHA1

          99a81c47c4c02f32c0ab456bfa23c306c7a09bf9

          SHA256

          25d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a

          SHA512

          c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4

        • \Users\Admin\AppData\Roaming\cmdk_ssp\fontocom.exe

          Filesize

          482KB

          MD5

          33553d2e380ee85675cd26f6efbb343d

          SHA1

          310a3b4df32151e5887552d320068b2a7bdcb8d5

          SHA256

          60e97ef397cf05b3b68987cf936ca88af5ec95dd94ef6cb6af77c9800de0643d

          SHA512

          c82a6300e7777b8b7fe3d195c22961dcc7c2428ff32a59557b9fd6e69ab27371de3d69558e5a2258ec8321f4c86bae3335c22ac760f36c6bdbb0e69e470a1d83

        • memory/1224-22-0x0000000002EC0000-0x0000000002F48000-memory.dmp

          Filesize

          544KB

        • memory/1224-24-0x0000000002EC0000-0x0000000002F48000-memory.dmp

          Filesize

          544KB

        • memory/1224-34-0x0000000002EC0000-0x0000000002F48000-memory.dmp

          Filesize

          544KB

        • memory/1224-36-0x0000000002570000-0x000000000257D000-memory.dmp

          Filesize

          52KB

        • memory/1224-37-0x0000000002560000-0x0000000002566000-memory.dmp

          Filesize

          24KB

        • memory/1304-26-0x00000000002E0000-0x0000000000361000-memory.dmp

          Filesize

          516KB

        • memory/1304-25-0x0000000000400000-0x0000000000483000-memory.dmp

          Filesize

          524KB

        • memory/1760-10-0x0000000000340000-0x00000000003C3000-memory.dmp

          Filesize

          524KB

        • memory/1760-1-0x0000000000220000-0x00000000002A1000-memory.dmp

          Filesize

          516KB

        • memory/1760-11-0x0000000000340000-0x00000000003C3000-memory.dmp

          Filesize

          524KB

        • memory/1760-0-0x0000000000400000-0x0000000000483000-memory.dmp

          Filesize

          524KB

        • memory/2416-17-0x00000000003C0000-0x00000000003C5000-memory.dmp

          Filesize

          20KB

        • memory/2416-15-0x0000000000490000-0x0000000000511000-memory.dmp

          Filesize

          516KB

        • memory/2416-35-0x0000000000400000-0x0000000000483000-memory.dmp

          Filesize

          524KB

        • memory/2416-13-0x0000000000400000-0x0000000000483000-memory.dmp

          Filesize

          524KB