Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2024, 08:01

General

  • Target

    stop.exe

  • Size

    89KB

  • MD5

    448dccb867b7696e3ed94bc96182affa

  • SHA1

    21e8b4eeebe459e0ab5f71fe6091f5dd5808a039

  • SHA256

    85b6bf95837502c230d0e92f5511e9ca5e503cdf15af0678584564723a2efb72

  • SHA512

    d904ef2ed7eec06c1917cb5763c241d9dad15320aa352f2351c92aceaba53d7d6719adffcb028eb51ea2f5d0b5ae8c75ead7640ab463193d40e5c66c2b586ad5

  • SSDEEP

    1536:Mc7ftfkS5g9YOms+gZcQipICdXkNDqLLZX9lItVGL++eIOlnToIfXwfOL:MyFfHgTWmCRkGbKGLeNTBfX1

Malware Config

Signatures

  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Connections Discovery 1 TTPs 2 IoCs

    Attempt to get a listing of network connections.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with WMI 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\stop.exe
    "C:\Users\Admin\AppData\Local\Temp\stop.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\F9A.tmp\FAB.tmp\FAC.bat C:\Users\Admin\AppData\Local\Temp\stop.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\system32\mshta.exe
        mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c C:\Users\Admin\AppData\Local\Temp\stop.exe ::","","runas",0)(window.close)
        3⤵
        • Access Token Manipulation: Create Process with Token
        • Modifies Internet Explorer settings
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\stop.exe ::
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Users\Admin\AppData\Local\Temp\stop.exe
            C:\Users\Admin\AppData\Local\Temp\stop.exe ::
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious use of WriteProcessMemory
            PID:2780
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\10F2.tmp\10F3.tmp\10F4.bat C:\Users\Admin\AppData\Local\Temp\stop.exe ::"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2656
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 5 127.0.0.1
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:2788
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c netstat -ano | findstr 38808
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Connections Discovery
                • Suspicious use of WriteProcessMemory
                PID:2540
                • C:\Windows\SysWOW64\NETSTAT.EXE
                  netstat -ano
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • System Network Connections Discovery
                  • Gathers network information
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2548
                • C:\Windows\SysWOW64\findstr.exe
                  findstr 38808
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2556
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /f /pid
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                PID:2596
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic process where ParentProcessId= call terminate
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with WMI
                • Suspicious use of AdjustPrivilegeToken
                PID:2616
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic process where "CommandLine Like '%-Dframework=DCP -Dservice=LocalAutoExecutor%'" call terminate
                7⤵
                • System Location Discovery: System Language Discovery
                • Kills process with WMI
                • Suspicious use of AdjustPrivilegeToken
                PID:1752
              • C:\Windows\SysWOW64\PING.EXE
                ping -n 2 127.0.0.1
                7⤵
                • System Location Discovery: System Language Discovery
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:2108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\F9A.tmp\FAB.tmp\FAC.bat

    Filesize

    878B

    MD5

    4c3d8e6836df5b79c9801e66b9c4544f

    SHA1

    8f4db94463b6ca0694ef20539be2110bae41155d

    SHA256

    490ed3f789efb0ec7b5486de682055c2fbd490f92f927757775f498f14f1d90f

    SHA512

    03c2bb1555a9cf330e2831fe39c4187309f0a3d775360bbf5f301d2a88c5323abf1d6a0cd48d1e4ba13178c1ab241a76b81495cea4b63ee468760a6b9a1092fe