Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 16:32

General

  • Target

    c5604fa1cf8d82960162ef353e072ee0N.exe

  • Size

    85KB

  • MD5

    c5604fa1cf8d82960162ef353e072ee0

  • SHA1

    8748c8d9bd5aaa5d2037d1c92b84db048deb789f

  • SHA256

    cdd3ecb63c30de836ab13f573ec82faa0688a3e5ea7e54d2178f984cf709c5c6

  • SHA512

    f840219065d07fa9f5d49b30bd9a142ead388f3d0020a0359d1f0913c69c48792de0506864d91816601509cf9f4af9038e9c9921e70de3893101891c1a70a2f9

  • SSDEEP

    1536:lXEN0rlw3e63tlxIHR6xSA7TWCDYAwNKUEiVghzCcnuaukliBLzQcOOGfbfpZJsV:lnw3DI6xd2Wxco

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5604fa1cf8d82960162ef353e072ee0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c5604fa1cf8d82960162ef353e072ee0N.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Public\Services\system.exe
      "C:\Users\Public\Services\system.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Users\Public\Services\system.exe
        "C:\Users\Public\Services\system.exe" help
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
          dw20.exe -x -s 388
          4⤵
            PID:2776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Public\Services\system.exe

      Filesize

      85KB

      MD5

      c5604fa1cf8d82960162ef353e072ee0

      SHA1

      8748c8d9bd5aaa5d2037d1c92b84db048deb789f

      SHA256

      cdd3ecb63c30de836ab13f573ec82faa0688a3e5ea7e54d2178f984cf709c5c6

      SHA512

      f840219065d07fa9f5d49b30bd9a142ead388f3d0020a0359d1f0913c69c48792de0506864d91816601509cf9f4af9038e9c9921e70de3893101891c1a70a2f9

    • memory/1908-0-0x000007FEF505E000-0x000007FEF505F000-memory.dmp

      Filesize

      4KB

    • memory/1908-1-0x000007FEF4DA0000-0x000007FEF573D000-memory.dmp

      Filesize

      9.6MB

    • memory/1908-2-0x000007FEF4DA0000-0x000007FEF573D000-memory.dmp

      Filesize

      9.6MB

    • memory/1908-12-0x000007FEF4DA0000-0x000007FEF573D000-memory.dmp

      Filesize

      9.6MB

    • memory/2304-11-0x000007FEF4DA0000-0x000007FEF573D000-memory.dmp

      Filesize

      9.6MB

    • memory/2304-13-0x000007FEF4DA0000-0x000007FEF573D000-memory.dmp

      Filesize

      9.6MB