Resubmissions

02-08-2024 14:36

240802-ryvdssxgqm 8

Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 14:36

General

  • Target

    Serial Checker/Checker.exe

  • Size

    409KB

  • MD5

    5ae052bc0a1c37418eb07b02de4ac4ae

  • SHA1

    41be7d4bd78144784b4b35694d72c0f321f0e324

  • SHA256

    afccfaac810fbb349b1ad9c770ba8256f7f726fc2ca327d49f6f5ab0240ee265

  • SHA512

    91db77b0a6184a066430f89ce68e8ed3e6ce80d33843d4bbb07a467d9a164f63db2e3d7bcf2b32e65e890b30099f0da7c5ac28134af026f309ae9366f4391ce2

  • SSDEEP

    6144:/NTbbNcOmdeyytlrL0QRWd09EaP0LS/6SrIR+Nk04XA:V0MyyD0QRWd09L8LTSrp4

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Serial Checker\Checker.exe
    "C:\Users\Admin\AppData\Local\Temp\Serial Checker\Checker.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:2884
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c cls
        2⤵
          PID:2728
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic diskdrive get name, serialnumber
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2888
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic diskdrive get name, serialnumber
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2612
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic logicaldisk get name, volumeserialnumber
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1032
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic logicaldisk get name, volumeserialnumber
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2768
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic csproduct get uuid
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2600
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic csproduct get uuid
            3⤵
              PID:2620
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c wmic baseboard get serialnumber
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1212
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic baseboard get serialnumber
              3⤵
                PID:3068
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c wmic systemenclosure get serialnumber
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2228
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic systemenclosure get serialnumber
                3⤵
                  PID:1984
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c wmic path Win32_NetworkAdapter where 'PNPDeviceID like '%%PCI%%' AND NetConnectionStatus=2 AND AdapterTypeID='0'' get MacAddress
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:604
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic path Win32_NetworkAdapter where 'PNPDeviceID like '%%PCI%%' AND NetConnectionStatus=2 AND AdapterTypeID='0'' get MacAddress
                  3⤵
                    PID:264
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c wmic cpu get partnumber,serialnumber, ProcessorId
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1348
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic cpu get partnumber,serialnumber, ProcessorId
                    3⤵
                      PID:1272
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c nvidia-smi -L
                    2⤵
                      PID:2236
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c wmic memorychip get serialnumber
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1052
                      • C:\Windows\System32\Wbem\WMIC.exe
                        wmic memorychip get serialnumber
                        3⤵
                          PID:2012
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c wmic os get SerialNumber
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2464
                        • C:\Windows\System32\Wbem\WMIC.exe
                          wmic os get SerialNumber
                          3⤵
                            PID:2148

                      Network

                      MITRE ATT&CK Matrix

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads