Analysis

  • max time kernel
    2s
  • max time network
    4s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-09-2024 05:37

General

  • Target

    dropper.exe

  • Size

    33.5MB

  • MD5

    5e84cd460ac5eb9ee72dd2f831297b52

  • SHA1

    17960e740ac5596b5025ab0515383df0db3b8753

  • SHA256

    8c473bf936fd8076a2330dbc420ed96b96a6169f747aab0129705e1d4e57309d

  • SHA512

    c670120cea8eef9ff2f017e1d13470774a155cbc5e47877adf45ed37a91afa89eee6903fd7b848d99a5cd0aed4c5619541928ea0ed63caeb866c0a68ca1a14de

  • SSDEEP

    786432:lkghL+KScDz/3G5qz0dwUOA9ZCVgQKwWCIPwUT49Zf3/b:agB7Db25qz0dQAUgGXIPwbZnb

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dropper.exe
    "C:\Users\Admin\AppData\Local\Temp\dropper.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3960
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" diskdrive get Model
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3252
    • C:\Windows\SYSTEM32\findstr.exe
      "findstr.exe" /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"
      2⤵
        PID:236
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C "C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\loader.bat"
        2⤵
          PID:2240

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\loader.bat

        Filesize

        20B

        MD5

        3f3a41bd8b90767fc6aac3793137c6f3

        SHA1

        8709a86ed2364a4daf7c443770b1f3fefc6d7529

        SHA256

        41b9efbeb8fe9a6f96a7ad64edbf1d06a24d5d4574d380191411af3d64614c80

        SHA512

        7555b2ec9e6b0a2c1eaaff954b0a7d5421f1b5b79b38261d5d5c1d5b41699047a2db2593b679ac454cd5e083508961d5689f5880136faf2470e9219463c37dc8

      • memory/3960-44-0x00000225D64B0000-0x00000225D66B0000-memory.dmp

        Filesize

        2.0MB

      • memory/3960-32-0x00000225D20E0000-0x00000225D2120000-memory.dmp

        Filesize

        256KB

      • memory/3960-16-0x00000225D2000000-0x00000225D2030000-memory.dmp

        Filesize

        192KB

      • memory/3960-4-0x000001E53CE10000-0x000001E53CE40000-memory.dmp

        Filesize

        192KB

      • memory/3960-40-0x00000225D6120000-0x00000225D61D0000-memory.dmp

        Filesize

        704KB

      • memory/3960-12-0x000001E53CE90000-0x000001E53CEB0000-memory.dmp

        Filesize

        128KB

      • memory/3960-24-0x00000225D2030000-0x00000225D2050000-memory.dmp

        Filesize

        128KB

      • memory/3960-0-0x00000225D2EF0000-0x00000225D3B80000-memory.dmp

        Filesize

        12.6MB

      • memory/3960-20-0x000001E53CF50000-0x000001E53CF70000-memory.dmp

        Filesize

        128KB

      • memory/3960-48-0x00000225D2120000-0x00000225D2160000-memory.dmp

        Filesize

        256KB

      • memory/3960-36-0x00000225D5FA0000-0x00000225D6010000-memory.dmp

        Filesize

        448KB

      • memory/3960-56-0x00000225D6700000-0x00000225D6750000-memory.dmp

        Filesize

        320KB

      • memory/3960-52-0x00000225D6240000-0x00000225D6280000-memory.dmp

        Filesize

        256KB

      • memory/3960-60-0x00000225D6830000-0x00000225D68C0000-memory.dmp

        Filesize

        576KB

      • memory/3960-28-0x00000225D4270000-0x00000225D4420000-memory.dmp

        Filesize

        1.7MB

      • memory/3960-8-0x000001E53CE40000-0x000001E53CE90000-memory.dmp

        Filesize

        320KB