Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-07-2024 10:30

General

  • Target

    PYOhhJc3begnCTC0.exe

  • Size

    16.5MB

  • MD5

    6aaca7d595518426e1e030d77560bbe2

  • SHA1

    021e51122e32976b7e919e96bbcca0c9c4de1553

  • SHA256

    f4c722435e2e8428aa5736b768cb0140b09a381e810150b5bf965aaa55ba7e99

  • SHA512

    e7551c7119e3b4cf7173717666f449ac33129d022fa21cfb206833ef920c15e640ff30dee9dc6617ecb875741fe2e72eece944b739dcd8c79b640f417cf92564

  • SSDEEP

    393216:OzBd2r1utiSDLyjyg5/Y1eoLbAZ4KPBJ7uQpMCpnshWk:8u1utbyjyuY8oLbAZ4KPz7utOG

Score
8/10

Malware Config

Signatures

  • Stops running service(s) 4 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PYOhhJc3begnCTC0.exe
    "C:\Users\Admin\AppData\Local\Temp\PYOhhJc3begnCTC0.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop faceit > nul
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1408
      • C:\Windows\system32\sc.exe
        sc stop faceit
        3⤵
        • Launches sc.exe
        PID:3612
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop bedaisy > nul
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4740
      • C:\Windows\system32\sc.exe
        sc stop bedaisy
        3⤵
        • Launches sc.exe
        PID:3440
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop vgk > nul
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3352
      • C:\Windows\system32\sc.exe
        sc stop vgk
        3⤵
        • Launches sc.exe
        PID:764
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop easyanticheat > nul
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Windows\system32\sc.exe
        sc stop easyanticheat
        3⤵
        • Launches sc.exe
        PID:4056
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop aurum > nul
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:320
      • C:\Windows\system32\sc.exe
        sc stop aurum
        3⤵
        • Launches sc.exe
        PID:1156
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop mracdrv > nul
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:884
      • C:\Windows\system32\sc.exe
        sc stop mracdrv
        3⤵
        • Launches sc.exe
        PID:4160
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop eseadriver > nul
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4288
      • C:\Windows\system32\sc.exe
        sc stop eseadriver
        3⤵
        • Launches sc.exe
        PID:4552
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop esportaldriver > nul
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4844
      • C:\Windows\system32\sc.exe
        sc stop esportaldriver
        3⤵
        • Launches sc.exe
        PID:652
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop mhyprot2 > nul
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Windows\system32\sc.exe
        sc stop mhyprot2
        3⤵
        • Launches sc.exe
        PID:4020
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c sc stop mhyprot > nul
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\system32\sc.exe
        sc stop mhyprot
        3⤵
        • Launches sc.exe
        PID:1404
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c pause
      2⤵
        PID:5100
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2748
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4272

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PRICache\1601268389\715946058.pri

      Filesize

      171KB

      MD5

      30ec43ce86e297c1ee42df6209f5b18f

      SHA1

      fe0a5ea6566502081cb23b2f0e91a3ab166aeed6

      SHA256

      8ccddf0c77743a42067782bc7782321330406a752f58fb15fb1cd446e1ef0ee4

      SHA512

      19e5a7197a92eeef0482142cfe0fb46f16ddfb5bf6d64e372e7258fa6d01cf9a1fac9f7258fd2fd73c0f8a064b8d79b51a1ec6d29bbb9b04cdbd926352388bae

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PRICache\4183903823\2290032291.pri

      Filesize

      2KB

      MD5

      b8da5aac926bbaec818b15f56bb5d7f6

      SHA1

      2b5bf97cd59e82c7ea96c31cf9998fbbf4884dc5

      SHA256

      5be5216ae1d0aed64986299528f4d4fe629067d5f4097b8e4b9d1c6bcf4f3086

      SHA512

      c39a28d58fb03f4f491bf9122a86a5cbe7677ec2856cf588f6263fa1f84f9ffc1e21b9bcaa60d290356f9018fb84375db532c8b678cf95cc0a2cc6ed8da89436

    • memory/1788-0-0x00007FFC43EB0000-0x00007FFC4408B000-memory.dmp

      Filesize

      1.9MB

    • memory/1788-1-0x00007FFC44090000-0x00007FFC44092000-memory.dmp

      Filesize

      8KB

    • memory/1788-3-0x0000000140000000-0x0000000141EA3000-memory.dmp

      Filesize

      30.6MB

    • memory/1788-5-0x0000000140000000-0x0000000141EA3000-memory.dmp

      Filesize

      30.6MB

    • memory/1788-8-0x00007FFC43EB0000-0x00007FFC4408B000-memory.dmp

      Filesize

      1.9MB