Analysis

  • max time kernel
    133s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05/08/2024, 15:59

General

  • Target

    ConsoleApplication4.exe

  • Size

    440KB

  • MD5

    57af9f8ace4ef7916f3fee50ce8e9e21

  • SHA1

    5bba0970399a3f8cd5f00552cc01a8779f2ab9b9

  • SHA256

    08a14dba6dd0346166cb3f83910445da3e940559543b670b04de8c22c94d78be

  • SHA512

    5c4464ba99b851380a7040e66bfd5f1c1721a97cbf12561731076a0825e172182e353aeef291fad872e0e227e22f00193a3eb0a633b06fd86338ba3ef4def1b6

  • SSDEEP

    6144:hEY5x8yvYfwmZVMGANc3OCbgFOCIJfkTn5OEfvpQDdubt8OHJmf68T7kJ8KoIw:WY5OyvIwmZANc+CbYGWVfFWpTQj

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ConsoleApplication4.exe
    "C:\Users\Admin\AppData\Local\Temp\ConsoleApplication4.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      C:\Users\Admin\AppData\Local\Temp\svchost.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3188
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ping -n 1 1.1.1.1
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 1 1.1.1.1
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:308
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic csproduct get uuid
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4632
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic csproduct get uuid
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1728
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4572
    • C:\Users\Admin\AppData\Local\Temp\ConsoleApplication4.exe
      "C:\Users\Admin\AppData\Local\Temp\ConsoleApplication4.exe"
      1⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4956
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        C:\Users\Admin\AppData\Local\Temp\svchost.exe
        2⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4380
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ping -n 1 1.1.1.1
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:4508
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 1.1.1.1
            4⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:4660
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic csproduct get uuid
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4320
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic csproduct get uuid
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:3740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      4.0MB

      MD5

      d43df96b6993162d5eda2f9af344f308

      SHA1

      3ff01450e55d445e974deeb609e1bcd1c219237c

      SHA256

      5e0bd7411b1233898ef8803de04c81e22fe40b554d6e81c63a6df671ef0b8bf7

      SHA512

      b18c13954a9c3cba6954cbdd2465d6ed6965898ed0340228882c4f2ac30b62046456758b24258b8c6b5fc59da06f2517fac05508882d317b990b74f020b4a894