Resubmissions
13-09-2024 18:39
240913-xa5grasank 713-09-2024 18:39
240913-xapfjasakp 713-09-2024 18:38
240913-xag2fssepd 713-09-2024 18:38
240913-w99ebasenb 713-09-2024 18:38
240913-w945la1hrk 713-09-2024 18:37
240913-w9jhws1hnj 7Analysis
-
max time kernel
14s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
13-09-2024 18:39
Static task
static1
Behavioral task
behavioral1
Sample
guess.exe
Resource
win10-20240611-en
General
-
Target
guess.exe
-
Size
5.8MB
-
MD5
be5cdeca07c5e91d204c34db575d0584
-
SHA1
5d581a372dfd6fd25de52150cfb012b31bbcceff
-
SHA256
f340b634b04ced4b79471d479d08252a87280cdba0fbc38232cff03f77e17be1
-
SHA512
0e95bc060e2e42e883d5949c123875eed93ea22946c9fc666193fdede0e360b2396dc71ac8bd47ba9f6539f633eac03c35e06bc150805693ec49fbefb67a32b2
-
SSDEEP
98304:IfyKcpp0xbq88uOMcvrFOamNH/CcyC+0OgEZKgmtKU9PcpaBXSiOuHYpL94ua5xF:AMwV8YQrFoQCigEZKBhPc8RSuHWulV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3208 guess.exe -
Loads dropped DLL 2 IoCs
pid Process 3208 guess.exe 3208 guess.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSystemEnvironmentPrivilege 2268 shutdown.exe Token: SeShutdownPrivilege 2268 shutdown.exe Token: SeRemoteShutdownPrivilege 2268 shutdown.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4036 wrote to memory of 3208 4036 guess.exe 71 PID 4036 wrote to memory of 3208 4036 guess.exe 71 PID 3208 wrote to memory of 2284 3208 guess.exe 72 PID 3208 wrote to memory of 2284 3208 guess.exe 72 PID 2284 wrote to memory of 2268 2284 cmd.exe 73 PID 2284 wrote to memory of 2268 2284 cmd.exe 73 PID 3208 wrote to memory of 1348 3208 guess.exe 74 PID 3208 wrote to memory of 1348 3208 guess.exe 74 PID 3208 wrote to memory of 1416 3208 guess.exe 75 PID 3208 wrote to memory of 1416 3208 guess.exe 75 PID 3208 wrote to memory of 3224 3208 guess.exe 76 PID 3208 wrote to memory of 3224 3208 guess.exe 76 PID 3208 wrote to memory of 5056 3208 guess.exe 77 PID 3208 wrote to memory of 5056 3208 guess.exe 77 PID 3208 wrote to memory of 1300 3208 guess.exe 78 PID 3208 wrote to memory of 1300 3208 guess.exe 78 PID 3208 wrote to memory of 3840 3208 guess.exe 79 PID 3208 wrote to memory of 3840 3208 guess.exe 79 PID 3208 wrote to memory of 2468 3208 guess.exe 80 PID 3208 wrote to memory of 2468 3208 guess.exe 80 PID 3208 wrote to memory of 2320 3208 guess.exe 81 PID 3208 wrote to memory of 2320 3208 guess.exe 81 PID 3208 wrote to memory of 944 3208 guess.exe 82 PID 3208 wrote to memory of 944 3208 guess.exe 82 PID 3208 wrote to memory of 1152 3208 guess.exe 83 PID 3208 wrote to memory of 1152 3208 guess.exe 83 PID 3208 wrote to memory of 2076 3208 guess.exe 84 PID 3208 wrote to memory of 2076 3208 guess.exe 84 PID 3208 wrote to memory of 1808 3208 guess.exe 85 PID 3208 wrote to memory of 1808 3208 guess.exe 85 PID 3208 wrote to memory of 3196 3208 guess.exe 86 PID 3208 wrote to memory of 3196 3208 guess.exe 86 PID 3208 wrote to memory of 4024 3208 guess.exe 87 PID 3208 wrote to memory of 4024 3208 guess.exe 87 PID 3208 wrote to memory of 2392 3208 guess.exe 88 PID 3208 wrote to memory of 2392 3208 guess.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\guess.exe"C:\Users\Admin\AppData\Local\Temp\guess.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\onefile_4036_133707263662546268\guess.exeC:\Users\Admin\AppData\Local\Temp\guess.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c shutdown -fw -s -t 003⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\system32\shutdown.exeshutdown -fw -s -t 004⤵
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:1348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:1416
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:3224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:5056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:1300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:3840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:2468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:2320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:1152
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:2076
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:1808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:3196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:4024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c echo ur cute bbg3⤵PID:2392
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
5.8MB
MD52f260f63ac3d069c7dd82e184ec166ec
SHA1582333ca84812f237a3db45980e3689fdabee212
SHA256f2eb82ae7273654bdd4a3727f89f87a356c916f12003ed11fff3faadfd9052b2
SHA5126dfba6cc75c1705a331488343cebb013fffd5010f0fe069705117f5add8946b86722f8065141b3a231991f61df482c488a94701db76a1f2257695a20201697a2
-
Filesize
6.6MB
MD5cae8fa4e7cb32da83acf655c2c39d9e1
SHA17a0055588a2d232be8c56791642cb0f5abbc71f8
SHA2568ad53c67c2b4db4387d5f72ee2a3ca80c40af444b22bf41a6cfda2225a27bb93
SHA512db2190da2c35bceed0ef91d7553ff0dea442286490145c3d0e89db59ba1299b0851e601cc324b5f7fd026414fc73755e8eff2ef5fb5eeb1c54a9e13e7c66dd0c