Analysis

  • max time kernel
    119s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2024 08:47

General

  • Target

    9a9333c1d54807390ac10e84ab651f60N.exe

  • Size

    64KB

  • MD5

    9a9333c1d54807390ac10e84ab651f60

  • SHA1

    31a71dc44013ab1c4a3cd71af4403bcf21d5a403

  • SHA256

    c2cc73470231e05140dec880b0785c18c7c337bc95ec6b9e11deea1a0b4c326a

  • SHA512

    5a977341a58babb945ae44c5c3b7ad6ff9078ee0f47ba3cbb80d3c396aad33c90469afba6cca3aabc78415cfac56a6964d48ab70e498e550212d67a54c255f3a

  • SSDEEP

    768:Ovw9813vhKQLroCU4/wQxWMZQcpFM1FgDagXP2TyS1tl7lfqvocqcdT3WVdl:6EGY0oCUlwWMZQcpmgDagIyS1loL7Wrl

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a9333c1d54807390ac10e84ab651f60N.exe
    "C:\Users\Admin\AppData\Local\Temp\9a9333c1d54807390ac10e84ab651f60N.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Windows\{CFAFEE3F-F9A5-496c-9029-6FE513D810A8}.exe
      C:\Windows\{CFAFEE3F-F9A5-496c-9029-6FE513D810A8}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Windows\{F5306D2E-B997-41b1-987D-154FAE8D44C6}.exe
        C:\Windows\{F5306D2E-B997-41b1-987D-154FAE8D44C6}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2424
        • C:\Windows\{9C777D34-9C36-4b0e-8308-9CFB3B09842F}.exe
          C:\Windows\{9C777D34-9C36-4b0e-8308-9CFB3B09842F}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Windows\{C5F71641-3583-4415-BA53-C5608DFF4C74}.exe
            C:\Windows\{C5F71641-3583-4415-BA53-C5608DFF4C74}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3056
            • C:\Windows\{1F1BA873-040C-41d6-8300-86332B35DE9A}.exe
              C:\Windows\{1F1BA873-040C-41d6-8300-86332B35DE9A}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2928
              • C:\Windows\{A4325623-93AD-41a9-9E88-DAF940DFA63F}.exe
                C:\Windows\{A4325623-93AD-41a9-9E88-DAF940DFA63F}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1612
                • C:\Windows\{CA34A4DF-F3FE-4979-BC44-62F39572868B}.exe
                  C:\Windows\{CA34A4DF-F3FE-4979-BC44-62F39572868B}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1888
                  • C:\Windows\{AD572AB2-11F3-43e0-AA08-5CC52B5A2408}.exe
                    C:\Windows\{AD572AB2-11F3-43e0-AA08-5CC52B5A2408}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:352
                    • C:\Windows\{DDDEAC2E-B34E-4d5d-8239-ECC2BA1E37C9}.exe
                      C:\Windows\{DDDEAC2E-B34E-4d5d-8239-ECC2BA1E37C9}.exe
                      10⤵
                      • Executes dropped EXE
                      PID:1476
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{AD572~1.EXE > nul
                      10⤵
                        PID:1808
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{CA34A~1.EXE > nul
                      9⤵
                        PID:264
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{A4325~1.EXE > nul
                      8⤵
                        PID:1876
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{1F1BA~1.EXE > nul
                      7⤵
                        PID:2836
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{C5F71~1.EXE > nul
                      6⤵
                        PID:2876
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{9C777~1.EXE > nul
                      5⤵
                        PID:628
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{F5306~1.EXE > nul
                      4⤵
                        PID:2556
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{CFAFE~1.EXE > nul
                      3⤵
                        PID:2720
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\9A9333~1.EXE > nul
                      2⤵
                      • Deletes itself
                      PID:1704

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Windows\{1F1BA873-040C-41d6-8300-86332B35DE9A}.exe

                    Filesize

                    64KB

                    MD5

                    529273157524dca17ea8fb287b368dc9

                    SHA1

                    839aeeee54939197e36b97e7d0e9d7b6cee719dc

                    SHA256

                    7f116708b6f617e6cd4f6b61b72341538044e7cd1729678e2c0851d6d3b87a5c

                    SHA512

                    c8b4ce6c994549a32229123455de68964c1810e0fa567acda0f2f5f532a14716d6e82e6647d066d5b36314e486037f78a22287acf57c2489aac8386093beaaff

                  • C:\Windows\{9C777D34-9C36-4b0e-8308-9CFB3B09842F}.exe

                    Filesize

                    64KB

                    MD5

                    29a239371d3df2b6e0778d7981af2c52

                    SHA1

                    96c5e09138825d502befd52e32885863b5147dc2

                    SHA256

                    66f1bef4aef4fae59f2357763e2843390a3c03b3aea42e019df2031b6b2c694f

                    SHA512

                    04c529cc07525be419c8cc31330d75774b3d11a53910b18e9dbf95c4ae00c354d6188c8f70e4815e188ec6941c7e7c6eebb0e75dbe768668d3dbda103a712ac3

                  • C:\Windows\{A4325623-93AD-41a9-9E88-DAF940DFA63F}.exe

                    Filesize

                    64KB

                    MD5

                    2ffc0006f7f8bcf72ecd7d4f2a1cde3c

                    SHA1

                    76d2ae7c38468c5dc9068a0abae63f59a78df4e3

                    SHA256

                    36abc535a558c07b564eebed81cb53b686c576b047b06d89f72144d7921698c3

                    SHA512

                    8d1d64ad97591e9fcf2f04e2d10ea2efb85133dc98350c5754fe32e69a13d84c4b34476057cfa1d5349ebdc2df2287693fae06ad2dc85bc30d3e89e88455191e

                  • C:\Windows\{AD572AB2-11F3-43e0-AA08-5CC52B5A2408}.exe

                    Filesize

                    64KB

                    MD5

                    bbbfb3207c63a5a10bdb5c64e12c71ea

                    SHA1

                    16f11742f01c9d7e5c01bf4d6f30d81907ad7a8d

                    SHA256

                    afcd8fa43450d85fe0601779e566ba214a45c64d2b6f321750914faa28bb18b9

                    SHA512

                    a623b30817ab368a71d0eadf3a71ab9c6c10ef1675939e0c41a0c9c3a7984ef309b80d45b54671d5ffc1b1045c74f3877bddd402f71025103896a1d09955efb1

                  • C:\Windows\{C5F71641-3583-4415-BA53-C5608DFF4C74}.exe

                    Filesize

                    64KB

                    MD5

                    83d9914cb4f6e8f5bdd603da96500d5f

                    SHA1

                    1fe90cb23cc77092124a167a935bfc5531645a86

                    SHA256

                    7d57fad7385dcce5cd41c369056521c8afd9f095a2ef4eff4014da0471d07be4

                    SHA512

                    831286ad444b1f9c7fd579104ad507afec6db042e20682ee43e0cc6315be09f5ec8c03e31469146e6a63d643b5373ee3c00113a31ed2f7090dffb64668b24a98

                  • C:\Windows\{CA34A4DF-F3FE-4979-BC44-62F39572868B}.exe

                    Filesize

                    64KB

                    MD5

                    195904238a0c5c300ef3bca50d9f4122

                    SHA1

                    aba36c2917edeba281d13e0bd14f1c70301a2ad9

                    SHA256

                    4a4fdbc7bff2bdd4ed736df33a3d324787d7b4e8b50a02a3b5f4c6d873616059

                    SHA512

                    6e033ea06ca432b023847fe0a561598dd24a95b79a0996ddde0b2bf11ffd949237f5ed3c46ef6c59eed0385e461554180812f601ed86c536b772f99658e475b5

                  • C:\Windows\{CFAFEE3F-F9A5-496c-9029-6FE513D810A8}.exe

                    Filesize

                    64KB

                    MD5

                    d24cb7f3611e60fddf3076254dc7d9ba

                    SHA1

                    660a0850352518973e3bda946ab5f2ce28bfec88

                    SHA256

                    1da7d8a0c6e82f2fcf5a8a85481805d0f2cba5568d3b5fa488b93f2005a4dd15

                    SHA512

                    376b015a28cebc3b319b6fbd37055ef9d5577f7cfcefca90aba0d04c9581ceda366e160da9d57aa7b853ac59c404a132d89e5aca3022ed7af48fe1347fbfe8d3

                  • C:\Windows\{DDDEAC2E-B34E-4d5d-8239-ECC2BA1E37C9}.exe

                    Filesize

                    64KB

                    MD5

                    a21c35e11f7f64b015be7139e0f44c55

                    SHA1

                    db018c715fe0f9e2e05dba561bcf3449da6fd697

                    SHA256

                    31cfe3423238fbaa4db2c20ebeeda8d3c2cc8a03360a7ae3f73d9c0135983bfa

                    SHA512

                    93829443aed13f6a9edb552de9392465f6c8da8612d1c29cb55d1cf1a55b501575a94cdbc9b1ba710bc444df295c110a001aab4e69f7a725713e1d5514702aef

                  • C:\Windows\{F5306D2E-B997-41b1-987D-154FAE8D44C6}.exe

                    Filesize

                    64KB

                    MD5

                    5d59ea9ef85e039f02f44bb27ecf5e60

                    SHA1

                    4dcc4cf7fd8089eb9dc7cc992ac2e50f539c08eb

                    SHA256

                    92cbae7ac726ab3b634a230e2b35ad422d2518e61a65a94287d1109dfbe4a82d

                    SHA512

                    87a6edbf63372cb5def6bd9d5f4de2de7736d75f83d662a8dabb7dc3c1b89bd1d62e71347c7ae7f79734387446d1893802f926a937cb7d1a6d24970d7e6fd4ed

                  • memory/352-83-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/352-75-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/1476-84-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/1612-65-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/1612-57-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/1888-74-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/1888-66-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/2100-0-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/2100-7-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/2100-8-0x0000000000280000-0x0000000000290000-memory.dmp

                    Filesize

                    64KB

                  • memory/2388-17-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/2388-9-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/2424-26-0x0000000000270000-0x0000000000280000-memory.dmp

                    Filesize

                    64KB

                  • memory/2424-25-0x0000000000270000-0x0000000000280000-memory.dmp

                    Filesize

                    64KB

                  • memory/2424-27-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/2424-18-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/2672-36-0x0000000000300000-0x0000000000310000-memory.dmp

                    Filesize

                    64KB

                  • memory/2672-37-0x0000000000300000-0x0000000000310000-memory.dmp

                    Filesize

                    64KB

                  • memory/2672-38-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/2672-29-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/2928-55-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB

                  • memory/2928-56-0x0000000000300000-0x0000000000310000-memory.dmp

                    Filesize

                    64KB

                  • memory/3056-47-0x0000000000400000-0x0000000000410000-memory.dmp

                    Filesize

                    64KB