Resubmissions

28-07-2024 09:32

240728-lh334stalh 10

28-07-2024 09:29

240728-lf31bsshnd 10

Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28-07-2024 09:29

General

  • Target

    windows.exe

  • Size

    913KB

  • MD5

    4c30c907584baa7c1931a3a83ba69149

  • SHA1

    09d3887d9895189a49930a61aea8c788b1ad1c0e

  • SHA256

    afc180f84398fdf09969b61c538dd1b7d2259fba43b44a5ed00dac386df7a046

  • SHA512

    1f581850f9722153d760f6a0f125b71aae3b87546c851a26674cc37ec76b13e39f8abc93a77e1d32fdfe906fa80945fbfb9774cb002dadd922b629879c9246cc

  • SSDEEP

    24576:1Eqr4MROxnF25bYmfFhQ3rZlI0AilFEvxHil71B:1EjMiz3rZlI0AilFEvxHi

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\windows.exe
    "C:\Users\Admin\AppData\Local\Temp\windows.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\a9qr97gi.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4628
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB528.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB527.tmp"
        3⤵
          PID:4376
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:1592

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RESB528.tmp

      Filesize

      1KB

      MD5

      7f0098ee28b37afdf693e57006632180

      SHA1

      44a7277b3ba2e563119ae8c882a2399336b6fe70

      SHA256

      87188d850f991237c0953dea3b6bfff1246342624ac65b8e30ffb57e30b6759f

      SHA512

      277e5acea67752622a4dba57fe77b2409c50974cc4af5efaeef8baaf77183dde86c5f0e081ed5cb20dcca239e02332ddfe65eec152585a1758963921c337d1de

    • C:\Users\Admin\AppData\Local\Temp\a9qr97gi.dll

      Filesize

      76KB

      MD5

      be84702ecbdcc4f2347ebe98b6cc084e

      SHA1

      065e7d08fa95d3d0a790538f781dca41fa38ca34

      SHA256

      c770551f7a208fd943a654e698f1d0a2499c19e6d0b66bf0c089f5cc90ecd123

      SHA512

      a9882cc56d96ddba6e07708fb4c61e898666f600a3b25af24e94c506a203ff12db0caee982870d037a5ffacb60933f0c09f8a5b5611b9ebd70f28dd8efeb099d

    • C:\Users\Admin\AppData\Roaming\Orcus\lib_66e10069bf334043882c3a304dfd504d\CSCore.dll

      Filesize

      516KB

      MD5

      dde3ec6e17bc518b10c99efbd09ab72e

      SHA1

      a2306e60b74b8a01a0dbc1199a7fffca288f2033

      SHA256

      60a5077b443273238e6629ce5fc3ff7ee3592ea2e377b8fc28bfe6e76bda64b8

      SHA512

      09a528c18291980ca7c5ddca67625035bbb21b9d95ab0854670d28c59c4e7adc6d13a356fa1d2c9ad75d16b334ae9818e06ddb10408a3e776e4ef0d7b295f877

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCB527.tmp

      Filesize

      676B

      MD5

      65dec07b5c0e933144b21dc92ab38159

      SHA1

      09264019c3ca7615d977e683293aa6cdfbd6874f

      SHA256

      86870d2e1484ae3964e5f99ad5137184183439d8f15b13f403a695cdf8eca675

      SHA512

      075f92bb29e38028c15126a58a0d54930cc0fed5befdc95ca6c5e254c70e1373a24db9ae93c9332686920844341839dcb2e250ace06a168f82a13feaa1c28e1e

    • \??\c:\Users\Admin\AppData\Local\Temp\a9qr97gi.0.cs

      Filesize

      208KB

      MD5

      4122c7921e7a45e99dee100a08a9d86f

      SHA1

      a053ef42a7c346981694db648fbbf1950dccde5f

      SHA256

      c1a6d958ec325d52d00696350fc7a71d77ff52faee874e366754259f54d62c1c

      SHA512

      373f253b06b8f4a305505757c805314c524989b0151e4636a77c73308fbe6416a69a5965cfbca391d426b90b0d7b37c67d2d2973bdf16cd2041a16f12b971017

    • \??\c:\Users\Admin\AppData\Local\Temp\a9qr97gi.cmdline

      Filesize

      349B

      MD5

      f124021b1c9e13f5effa2790c22557d8

      SHA1

      5c1556bb884fe9a602da1c507bf0aa23203411ab

      SHA256

      e8d0fe92a9d59b27e38222fd9f35ba7a3d258182b8ade53f6a2430c973e0d309

      SHA512

      d5155fcff3711894b272eb37b1b0ebe1151c8d3b0cdd4d80ad3d6f753f11dc9493e14abc58be7cf0f84de965f5382f75748f33a4dd4adb96099b160c4aee2533

    • memory/1188-37-0x000000001E1B0000-0x000000001E1C8000-memory.dmp

      Filesize

      96KB

    • memory/1188-46-0x00007FFCDCAB0000-0x00007FFCDD451000-memory.dmp

      Filesize

      9.6MB

    • memory/1188-7-0x000000001BF00000-0x000000001C3CE000-memory.dmp

      Filesize

      4.8MB

    • memory/1188-134-0x0000000020020000-0x0000000020054000-memory.dmp

      Filesize

      208KB

    • memory/1188-6-0x000000001B8F0000-0x000000001B8FE000-memory.dmp

      Filesize

      56KB

    • memory/1188-3-0x000000001B700000-0x000000001B75C000-memory.dmp

      Filesize

      368KB

    • memory/1188-129-0x000000001E330000-0x000000001E346000-memory.dmp

      Filesize

      88KB

    • memory/1188-2-0x00007FFCDCAB0000-0x00007FFCDD451000-memory.dmp

      Filesize

      9.6MB

    • memory/1188-23-0x000000001CA00000-0x000000001CA16000-memory.dmp

      Filesize

      88KB

    • memory/1188-25-0x0000000001190000-0x00000000011A2000-memory.dmp

      Filesize

      72KB

    • memory/1188-26-0x0000000001110000-0x0000000001118000-memory.dmp

      Filesize

      32KB

    • memory/1188-27-0x000000001B6F0000-0x000000001B6F8000-memory.dmp

      Filesize

      32KB

    • memory/1188-28-0x000000001CDF0000-0x000000001CE52000-memory.dmp

      Filesize

      392KB

    • memory/1188-29-0x000000001D760000-0x000000001DD1A000-memory.dmp

      Filesize

      5.7MB

    • memory/1188-30-0x000000001DD20000-0x000000001DE10000-memory.dmp

      Filesize

      960KB

    • memory/1188-31-0x000000001CF50000-0x000000001CF6E000-memory.dmp

      Filesize

      120KB

    • memory/1188-32-0x000000001DE20000-0x000000001DE69000-memory.dmp

      Filesize

      292KB

    • memory/1188-33-0x00007FFCDCAB0000-0x00007FFCDD451000-memory.dmp

      Filesize

      9.6MB

    • memory/1188-34-0x000000001DF00000-0x000000001DF70000-memory.dmp

      Filesize

      448KB

    • memory/1188-35-0x00007FFCDCAB0000-0x00007FFCDD451000-memory.dmp

      Filesize

      9.6MB

    • memory/1188-0-0x00007FFCDCD65000-0x00007FFCDCD66000-memory.dmp

      Filesize

      4KB

    • memory/1188-38-0x000000001CF80000-0x000000001CF90000-memory.dmp

      Filesize

      64KB

    • memory/1188-39-0x000000001CF90000-0x000000001CF98000-memory.dmp

      Filesize

      32KB

    • memory/1188-42-0x000000001F300000-0x000000001F43C000-memory.dmp

      Filesize

      1.2MB

    • memory/1188-45-0x00007FFCDCD65000-0x00007FFCDCD66000-memory.dmp

      Filesize

      4KB

    • memory/1188-8-0x000000001C3D0000-0x000000001C46C000-memory.dmp

      Filesize

      624KB

    • memory/1188-47-0x00007FFCDCAB0000-0x00007FFCDD451000-memory.dmp

      Filesize

      9.6MB

    • memory/1188-48-0x00007FFCDCAB0000-0x00007FFCDD451000-memory.dmp

      Filesize

      9.6MB

    • memory/1188-49-0x00007FFCDCAB0000-0x00007FFCDD451000-memory.dmp

      Filesize

      9.6MB

    • memory/1188-51-0x000000001E710000-0x000000001E796000-memory.dmp

      Filesize

      536KB

    • memory/1188-1-0x00007FFCDCAB0000-0x00007FFCDD451000-memory.dmp

      Filesize

      9.6MB

    • memory/1188-57-0x000000001F640000-0x000000001F71A000-memory.dmp

      Filesize

      872KB

    • memory/1188-64-0x000000001E210000-0x000000001E221000-memory.dmp

      Filesize

      68KB

    • memory/1188-71-0x000000001E210000-0x000000001E221000-memory.dmp

      Filesize

      68KB

    • memory/1188-73-0x000000001E110000-0x000000001E154000-memory.dmp

      Filesize

      272KB

    • memory/1188-78-0x000000001E350000-0x000000001E39A000-memory.dmp

      Filesize

      296KB

    • memory/1188-83-0x000000001F720000-0x000000001F77A000-memory.dmp

      Filesize

      360KB

    • memory/1188-88-0x000000001F780000-0x000000001F7A6000-memory.dmp

      Filesize

      152KB

    • memory/1188-96-0x000000001F7B0000-0x000000001F904000-memory.dmp

      Filesize

      1.3MB

    • memory/1188-104-0x0000000000CD0000-0x0000000000CDC000-memory.dmp

      Filesize

      48KB

    • memory/1188-109-0x0000000000D00000-0x0000000000D16000-memory.dmp

      Filesize

      88KB

    • memory/1188-116-0x000000001FE10000-0x000000001FF62000-memory.dmp

      Filesize

      1.3MB

    • memory/1188-117-0x00000000010C0000-0x000000000110A000-memory.dmp

      Filesize

      296KB

    • memory/1188-118-0x00000000200D0000-0x0000000020136000-memory.dmp

      Filesize

      408KB

    • memory/1188-121-0x000000001E210000-0x000000001E221000-memory.dmp

      Filesize

      68KB

    • memory/1188-122-0x000000001FE10000-0x000000001FE8D000-memory.dmp

      Filesize

      500KB

    • memory/1188-124-0x000000001FFA0000-0x000000001FFDE000-memory.dmp

      Filesize

      248KB

    • memory/4628-21-0x00007FFCDCAB0000-0x00007FFCDD451000-memory.dmp

      Filesize

      9.6MB

    • memory/4628-16-0x00007FFCDCAB0000-0x00007FFCDD451000-memory.dmp

      Filesize

      9.6MB