Analysis

  • max time kernel
    134s
  • max time network
    137s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-09-2024 05:45

General

  • Target

    dropper.exe

  • Size

    33.5MB

  • MD5

    5e84cd460ac5eb9ee72dd2f831297b52

  • SHA1

    17960e740ac5596b5025ab0515383df0db3b8753

  • SHA256

    8c473bf936fd8076a2330dbc420ed96b96a6169f747aab0129705e1d4e57309d

  • SHA512

    c670120cea8eef9ff2f017e1d13470774a155cbc5e47877adf45ed37a91afa89eee6903fd7b848d99a5cd0aed4c5619541928ea0ed63caeb866c0a68ca1a14de

  • SSDEEP

    786432:lkghL+KScDz/3G5qz0dwUOA9ZCVgQKwWCIPwUT49Zf3/b:agB7Db25qz0dQAUgGXIPwbZnb

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dropper.exe
    "C:\Users\Admin\AppData\Local\Temp\dropper.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:204
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" diskdrive get Model
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4636
    • C:\Windows\SYSTEM32\findstr.exe
      "findstr.exe" /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"
      2⤵
        PID:4884
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C "C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\loader.bat"
        2⤵
          PID:1092

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\loader.bat

        Filesize

        20B

        MD5

        3f3a41bd8b90767fc6aac3793137c6f3

        SHA1

        8709a86ed2364a4daf7c443770b1f3fefc6d7529

        SHA256

        41b9efbeb8fe9a6f96a7ad64edbf1d06a24d5d4574d380191411af3d64614c80

        SHA512

        7555b2ec9e6b0a2c1eaaff954b0a7d5421f1b5b79b38261d5d5c1d5b41699047a2db2593b679ac454cd5e083508961d5689f5880136faf2470e9219463c37dc8

      • memory/204-43-0x00000211B4DE0000-0x00000211B4E20000-memory.dmp

        Filesize

        256KB

      • memory/204-13-0x00000211B4010000-0x00000211B4060000-memory.dmp

        Filesize

        320KB

      • memory/204-54-0x00000211B7F40000-0x00000211B7FF0000-memory.dmp

        Filesize

        704KB

      • memory/204-18-0x00000211B3F80000-0x00000211B3FA0000-memory.dmp

        Filesize

        128KB

      • memory/204-49-0x00000211B7E20000-0x00000211B7E90000-memory.dmp

        Filesize

        448KB

      • memory/204-8-0x000001D11D770000-0x000001D11D7A0000-memory.dmp

        Filesize

        192KB

      • memory/204-38-0x00000211B6380000-0x00000211B6530000-memory.dmp

        Filesize

        1.7MB

      • memory/204-59-0x00000211B82D0000-0x00000211B84D0000-memory.dmp

        Filesize

        2.0MB

      • memory/204-23-0x00000211B40B0000-0x00000211B40E0000-memory.dmp

        Filesize

        192KB

      • memory/204-28-0x00000211B4060000-0x00000211B4080000-memory.dmp

        Filesize

        128KB

      • memory/204-2-0x00000211B4F30000-0x00000211B5BC0000-memory.dmp

        Filesize

        12.6MB

      • memory/204-64-0x00000211B6170000-0x00000211B61B0000-memory.dmp

        Filesize

        256KB

      • memory/204-69-0x00000211B84D0000-0x00000211B8510000-memory.dmp

        Filesize

        256KB

      • memory/204-74-0x00000211B8560000-0x00000211B85B0000-memory.dmp

        Filesize

        320KB

      • memory/204-79-0x00000211B8690000-0x00000211B8720000-memory.dmp

        Filesize

        576KB

      • memory/204-84-0x00000211B8030000-0x00000211B8050000-memory.dmp

        Filesize

        128KB

      • memory/204-33-0x00000211B4D90000-0x00000211B4DB0000-memory.dmp

        Filesize

        128KB