Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 13:50

General

  • Target

    ManageEngine_ADManager_Plus_64.exe

  • Size

    282.3MB

  • MD5

    c09b58d4debdd97d004d776eac1facc6

  • SHA1

    1336a29f4697cbb96c593b92b0b0ddc33d6c5a4a

  • SHA256

    9f7b1e86e0124caf115f4b5d21caac24c0c393ad64b34bc606d7cd272f14a5e8

  • SHA512

    eb9c8f736f31b1673b6758ff7a2f4f96c733ba1e53ef5122e979dac8dd473fae56227bfea9ff0699a7b90307fef0a9cb0c8a40b3341d61dc45e4e6af896a37cb

  • SSDEEP

    6291456:AJVoeNwhd9+S0SmYf7upaXryzQtxRet1UEH+7yvVXkQgXya:mae6zP0taUzA81/H+S9kB5

Score
4/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 6 IoCs
  • Gathers system information 1 TTPs 2 IoCs

    Runs systeminfo.exe.

  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ManageEngine_ADManager_Plus_64.exe
    "C:\Users\Admin\AppData\Local\Temp\ManageEngine_ADManager_Plus_64.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4940
    • C:\Users\Admin\AppData\Local\Temp\{F3602B1B-BBB4-4002-AB46-D012665C15CA}\ManageEngine_ADManager_Plus_64.exe
      C:\Users\Admin\AppData\Local\Temp\{F3602B1B-BBB4-4002-AB46-D012665C15CA}\ManageEngine_ADManager_Plus_64.exe -package:"C:\Users\Admin\AppData\Local\Temp\ManageEngine_ADManager_Plus_64.exe" -no_selfdeleter -IS_temp -media_path:"C:\Users\Admin\AppData\Local\Temp\{F3602B1B-BBB4-4002-AB46-D012665C15CA}\Disk1\" -tempdisk1folder:"C:\Users\Admin\AppData\Local\Temp\{F3602B1B-BBB4-4002-AB46-D012665C15CA}\" -IS_OriginalLauncher:"C:\Users\Admin\AppData\Local\Temp\{F3602B1B-BBB4-4002-AB46-D012665C15CA}\Disk1\ManageEngine_ADManager_Plus_64.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3720
      • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8717A91A-9ADA-44DB-B358-4E05C883BE76}
        3⤵
        • Executes dropped EXE
        PID:3144
      • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B5802A2F-19CD-4073-952A-CF2F38A2F9EF}
        3⤵
        • Executes dropped EXE
        PID:3400
      • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{013B10CC-6836-45D3-91D6-774D65D4150D}
        3⤵
        • Executes dropped EXE
        PID:2632
      • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B19F0B61-9481-463C-87B5-B1B441763A6B}
        3⤵
        • Executes dropped EXE
        PID:2444
      • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{986F5D83-1B26-42C0-92B5-E4CC4DF64519}
        3⤵
        • Executes dropped EXE
        PID:2780
      • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{6D27F89A-BEDD-40B1-92DB-6C9802F4CAEB}
        3⤵
        • Executes dropped EXE
        PID:3860
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\SysWOW64\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{CC00BC3F-40AE-49A7-BA63-FE2F93D20585}\run_getcountry.bat C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{CC00BC3F-40AE-49A7-BA63-FE2F93D20585}\
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4956
        • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{CC00BC3F-40AE-49A7-BA63-FE2F93D20585}\getcountry.exe
          C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{CC00BC3F-40AE-49A7-BA63-FE2F93D20585}\\getcountry.exe
          4⤵
          • Executes dropped EXE
          PID:464
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\SysWOW64\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{CC00BC3F-40AE-49A7-BA63-FE2F93D20585}\CheckVMBuild.bat > C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{CC00BC3F-40AE-49A7-BA63-FE2F93D20585}\checkVM_err.txt 2>&1
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4092
        • C:\Windows\SysWOW64\systeminfo.exe
          systeminfo
          4⤵
          • Gathers system information
          PID:1900
        • C:\Windows\SysWOW64\find.exe
          find /i "System Manufacturer"
          4⤵
            PID:4088
          • C:\Windows\SysWOW64\systeminfo.exe
            systeminfo
            4⤵
            • Gathers system information
            PID:2492
          • C:\Windows\SysWOW64\find.exe
            find /i "BIOS Version"
            4⤵
              PID:4988
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo System Manufacturer: Gigabyte Technology Co., Ltd. "
              4⤵
                PID:2388
              • C:\Windows\SysWOW64\findstr.exe
                "C:\Windows\system32\findstr.exe" /C:"Xen"
                4⤵
                  PID:4436
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo BIOS Version: N/A, 4/1/2014 "
                  4⤵
                    PID:4376
                  • C:\Windows\SysWOW64\findstr.exe
                    "C:\Windows\system32\findstr.exe" /C:"4.4.1-xs"
                    4⤵
                      PID:4992

              Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\ISBEW64.exe

                      Filesize

                      177KB

                      MD5

                      31c814fbb7f289fa3ed8f32143bb2512

                      SHA1

                      ba34681bad1144180c85c50d4fb360835e9e070c

                      SHA256

                      13097ee83046bc4066b4819f8881fefe3dcebf503a519373d449a664074d9301

                      SHA512

                      10fd501c2850e0a904f3ab9b71042a4082773caaca9e5dce01cd2d6ecbf82e418e713db0a72566f8d6d6c0b2b494f4c326bf966dec853e6b89120619a0b3e8b7

                    • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{CC00BC3F-40AE-49A7-BA63-FE2F93D20585}\CheckVMBuild.bat

                      Filesize

                      1KB

                      MD5

                      04896cc09d3d928b58c08cefe765900a

                      SHA1

                      d20961acb0e06376df791103b2e0988d2eb04ff3

                      SHA256

                      3196f5309bf7eeda201172aa799d0c01a402fade768756e1044ccae2648c1d1c

                      SHA512

                      cbf6ea814a06a570abdafbb2eb3bd65958b276d1c3b485ca0dffd996410d5e1114997423b40847f4019e2fed9b03b1bcfc3171e8fab946b6658db464b4fedba8

                    • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{CC00BC3F-40AE-49A7-BA63-FE2F93D20585}\getcountry_output1.txt

                      Filesize

                      1B

                      MD5

                      cfcd208495d565ef66e7dff9f98764da

                      SHA1

                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                      SHA256

                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                      SHA512

                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                    • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{CC00BC3F-40AE-49A7-BA63-FE2F93D20585}\run_getcountry.bat

                      Filesize

                      46B

                      MD5

                      69f850ccfa07a946af4b7d1beb7fd594

                      SHA1

                      648b2b3945b40335c7159fa8ff90608fe25ade97

                      SHA256

                      f041856db540d93a2907ef9c70b76a83ebaceeb0e2df9be48e9fc79acf19ae24

                      SHA512

                      6ba67214a06c2d53fbd01f125b7fd8388fabdb864aa48cb5fef8eac610066ed4c6a77675951a73f88c12f97c26462b1435db72f3ad6c91a540201301603631cc

                    • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{cc00bc3f-40ae-49a7-ba63-fe2f93d20585}\Cus6DE5.tmp

                      Filesize

                      32KB

                      MD5

                      c3daafeca40caa6d767c999798e50537

                      SHA1

                      e79c6a7ec882b2d362e7f7f9272ee97b511618ae

                      SHA256

                      9598bd23f378e512d7309d8009d074fabedb0cfe89140b91ce6e4fac08843136

                      SHA512

                      77c4151a5d726a9b6419577be02bcc345c2a5123d18e89da31193cdcaf8cd267c3b8faf30a07a1c48a4d76631ccdd9354e836c1e5e86e2d8ef1ca8baabc56d33

                    • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{cc00bc3f-40ae-49a7-ba63-fe2f93d20585}\DIFxData.ini

                      Filesize

                      84B

                      MD5

                      1eb6253dee328c2063ca12cf657be560

                      SHA1

                      46e01bcbb287873cf59c57b616189505d2bb1607

                      SHA256

                      6bc8b890884278599e4c0ca4095cefdf0f5394c5796012d169cc0933e03267a1

                      SHA512

                      7c573896abc86d899afbce720690454c06dbfafa97b69bc49b8e0ddec5590ce16f3cc1a30408314db7c4206aa95f5c684a6587ea2da033aecc4f70720fc6189e

                    • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{cc00bc3f-40ae-49a7-ba63-fe2f93d20585}\FontData.ini

                      Filesize

                      37B

                      MD5

                      8ce28395a49eb4ada962f828eca2f130

                      SHA1

                      270730e2969b8b03db2a08ba93dfe60cbfb36c5f

                      SHA256

                      a7e91b042ce33490353c00244c0420c383a837e73e6006837a60d3c174102932

                      SHA512

                      bb712043cddbe62b5bfdd79796299b0c4de0883a39f79cd006d3b04a1a2bed74b477df985f7a89b653e20cb719b94fa255fdaa0819a8c6180c338c01f39b8382

                    • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{cc00bc3f-40ae-49a7-ba63-fe2f93d20585}\_isres_0x0409.dll

                      Filesize

                      1.8MB

                      MD5

                      c45e398014c37e42bce48f1b948781e7

                      SHA1

                      841c3d4427c2a34ac9d12fd7bf41fd0cf3c42b8e

                      SHA256

                      a79653e9f6c1cd1fee41316822b1954fc7ddc348218064d447f23be17cdfaeea

                      SHA512

                      92c1238adddf7998b3060d9646785670a5de11eccf06835f4042e1160f693c0f294321a67cca06487bdb822ce4469cd9958b55c89c08fca3abc6d21bbf98a51f

                    • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{cc00bc3f-40ae-49a7-ba63-fe2f93d20585}\_isuser_0x0409.dll

                      Filesize

                      36KB

                      MD5

                      0cfdb1fcd2fc8a6bb2157f0ee16a0ed8

                      SHA1

                      efad8fd05048a2c10dc938361bc611b47693e0b8

                      SHA256

                      ecf3e49c16c0d81e6f7e5573e97921e9ce6c67ea0f3e1946dfec3d52a9a87238

                      SHA512

                      dced4459836aeb16f94da8b3792079243eab1a18b40290c8f993bf78af864b42c283b81038d47fbec7fdb2f4b1c29039ded08c769232245930c2a6c81e9f9b40

                    • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{cc00bc3f-40ae-49a7-ba63-fe2f93d20585}\getcountry.exe

                      Filesize

                      44KB

                      MD5

                      48462464bdf16d6b4185e827687ddf27

                      SHA1

                      3421f979498208f8fb4177ea015f31ba504e8d6d

                      SHA256

                      5a13098a23868f205f42641065f155a94ae9e209a96821d0be82ae9200651d6f

                      SHA512

                      0dff25ae60f851d076e1e2923e5cf53bf01669282148276002457f6de74483a38a83eed87fc0aa04f412805d739b117eb714e98b15945b72f311e422996db08e

                    • C:\Users\Admin\AppData\Local\Temp\{9324B40C-8840-4A5A-90ED-0683BE8F8E32}\{cc00bc3f-40ae-49a7-ba63-fe2f93d20585}\isrt.dll

                      Filesize

                      425KB

                      MD5

                      7918d6b9f03c614a76c041c9b6e7fd24

                      SHA1

                      55490154d83ae60f953860c953291bd2728b2d2c

                      SHA256

                      379176a5ecde21f492dcc719250d47c368ae039eb9e549da8e300e6d69be6d72

                      SHA512

                      02dfee9452b3132a69818c151b57762611f92f9408e03597484e2672610128d187ec61d4d822e0182c66dc9364f5a6bed35ed7641eba0c9da3adedae2d4dc901

                    • C:\Users\Admin\AppData\Local\Temp\{F3602B1B-BBB4-4002-AB46-D012665C15CA}\Disk1\0x0409.ini

                      Filesize

                      21KB

                      MD5

                      a108f0030a2cda00405281014f897241

                      SHA1

                      d112325fa45664272b08ef5e8ff8c85382ebb991

                      SHA256

                      8b76df0ffc9a226b532b60936765b852b89780c6e475c152f7c320e085e43948

                      SHA512

                      d83894b039316c38915a789920758664257680dcb549a9b740cf5361addbee4d4a96a3ff2999b5d8acfb1d9336da055ec20012d29a9f83ee5459f103fbeec298

                    • C:\Users\Admin\AppData\Local\Temp\{F3602B1B-BBB4-4002-AB46-D012665C15CA}\Disk1\ISSetup.dll

                      Filesize

                      1.6MB

                      MD5

                      9c9f06532bbc96493531aaa57bc0fc57

                      SHA1

                      b73f6cbdc02f49b2d62645ec31888fc904578a50

                      SHA256

                      60ebc86c2dd03056ad48adc6d2468fd54c548a55d2d305577eb7e079d90ac13f

                      SHA512

                      731dfc6823d843b731b7cbcd3fff252a40920f43c7334f90ae9b177f5c79293f626ef3ef41e313436dc3d137c7015b2d926e2f755958b40c843d42699ce75391

                    • C:\Users\Admin\AppData\Local\Temp\{F3602B1B-BBB4-4002-AB46-D012665C15CA}\Disk1\data1.cab

                      Filesize

                      1.6MB

                      MD5

                      351e22e69d9fd4211c6b6983a1c0ce70

                      SHA1

                      7c0586499faee5b896af367d77934f65a2586cbf

                      SHA256

                      7903872383ad5730555bc5f957d2677b4f85ac2d44ee3084b46095fc2fc17708

                      SHA512

                      e2726a9c5b7dccca10a4d62ca021bdcb29f4b590431220b05d87e3b19c31b76fbfa5231a5e055119fb0d039d58431851b91096d1ad44564817c1917526834446

                    • C:\Users\Admin\AppData\Local\Temp\{F3602B1B-BBB4-4002-AB46-D012665C15CA}\Disk1\data1.hdr

                      Filesize

                      2.0MB

                      MD5

                      67e0f00569ed62ce57d9a786bec945c6

                      SHA1

                      f81afde07a0972a58a627855ff01577541cfdd2d

                      SHA256

                      776d1ca320682c6ebb105dfdd7f0dda9568d7015f812be9a899697c829bc8b54

                      SHA512

                      7f9aa4b6ad0c83414e8478209391ef0c66d36ebc270e3dea7112cae360f7dee4bd817af122233c7e69c184c884a3951202ff9ce1587446729a41b1e6ac0d2613

                    • C:\Users\Admin\AppData\Local\Temp\{F3602B1B-BBB4-4002-AB46-D012665C15CA}\Disk1\layout.bin

                      Filesize

                      578B

                      MD5

                      340d0fdbee22d6124aee9eeb1e46050d

                      SHA1

                      fd778615b46538ae66813d6d2ef7eb1d8b8121d0

                      SHA256

                      c03f0261a2f3f543692b9655e42101e36566ac1d2ac37655c7043ebf223ae322

                      SHA512

                      d073ca098dc9856bc86da056dde093ab18fbcdb3199b63290b1c153973020b73cd8cddffd7b33b824d54b2a26470da906a21e317cb727500da9b96d6b4baabb6

                    • C:\Users\Admin\AppData\Local\Temp\{F3602B1B-BBB4-4002-AB46-D012665C15CA}\Disk1\setup.bmp

                      Filesize

                      27KB

                      MD5

                      1bb4e202f8d50c5bc9842b9a9fdedcad

                      SHA1

                      aba4afb0f3ad703bba4532c959a0a5528cbc2ac1

                      SHA256

                      b5ca3bb9ab251d63cc9b87aab8bae8f2722a02e5a39533f03c2c3a125e52476b

                      SHA512

                      384ad767668101df480db4e0f5760bab1d3d5dc04cfad73969cd7ea5df83999720ed75877fe9740f62bc73d5bfe94198bec5cddbd0dbc1bd4813fde95deb8b9c

                    • C:\Users\Admin\AppData\Local\Temp\{F3602B1B-BBB4-4002-AB46-D012665C15CA}\Disk1\setup.inx

                      Filesize

                      353KB

                      MD5

                      d302b04b47f8d3ba7a55471c9616b396

                      SHA1

                      a8810bd26c74e732edcba706f02bd8ec746fa6c2

                      SHA256

                      3bbdd172b779ead42902e98aa373d6ddfde6f43827dad3af2c125526e5fe8ea4

                      SHA512

                      5b907139b9cf5b26d28796285cb2a8e1354d315c2b15598b056dd0bcd10e352752f4b85539af0c042a97c32fa867fc297b4227b42a9e6943a470744359ff33bf

                    • C:\Users\Admin\AppData\Local\Temp\{F3602B1B-BBB4-4002-AB46-D012665C15CA}\ManageEngine_ADManager_Plus_64.exe

                      Filesize

                      986KB

                      MD5

                      b26bff5dbc6c8d868d2b2fcb91f9f7c2

                      SHA1

                      58eaba5c1797e02d1373a96ea22e955f520397eb

                      SHA256

                      7ac2735b78b919484a1e67fdb5f50848b3cd82c7418d50e255e800a697f14e9f

                      SHA512

                      c92e158033677603b4ceb77074e00215ad4328a4c846c229605d5a66b7016c1d8107aa633e23aebfe6bf657b06b5cda73cc8c595c79b12a993ace9a5f61cf1a0

                    • C:\Users\Admin\AppData\Local\Temp\{F3602B1B-BBB4-4002-AB46-D012665C15CA}\setup.ini

                      Filesize

                      2KB

                      MD5

                      921b781e6445a221041b960ae3476d96

                      SHA1

                      5126f00c16b8c1d35abf165f0f01f9f3e1f05f46

                      SHA256

                      90cf303dc30197f684c498c3ae97e0f7d6f49ee1a7d9963d25a2dd0cc152cc28

                      SHA512

                      cb31c856dc344260d9bc71303d11006f4b9bd16819dcdf9bb265c19b634569bab7770dddf4b0d94dd95ad14442869dd0f84b4766a1aeb896507ff5a0f7eea01e

                    • memory/3720-253-0x0000000002940000-0x0000000002942000-memory.dmp

                      Filesize

                      8KB

                    • memory/3720-278-0x0000000010000000-0x0000000010114000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/3720-258-0x0000000005ED0000-0x0000000006097000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/3720-251-0x0000000010000000-0x0000000010114000-memory.dmp

                      Filesize

                      1.1MB

                    • memory/3720-320-0x0000000010000000-0x0000000010114000-memory.dmp

                      Filesize

                      1.1MB