Analysis

  • max time kernel
    132s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-09-2024 05:47

General

  • Target

    dropper.exe

  • Size

    33.5MB

  • MD5

    5e84cd460ac5eb9ee72dd2f831297b52

  • SHA1

    17960e740ac5596b5025ab0515383df0db3b8753

  • SHA256

    8c473bf936fd8076a2330dbc420ed96b96a6169f747aab0129705e1d4e57309d

  • SHA512

    c670120cea8eef9ff2f017e1d13470774a155cbc5e47877adf45ed37a91afa89eee6903fd7b848d99a5cd0aed4c5619541928ea0ed63caeb866c0a68ca1a14de

  • SSDEEP

    786432:lkghL+KScDz/3G5qz0dwUOA9ZCVgQKwWCIPwUT49Zf3/b:agB7Db25qz0dQAUgGXIPwbZnb

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dropper.exe
    "C:\Users\Admin\AppData\Local\Temp\dropper.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3236
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" diskdrive get Model
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:796
    • C:\Windows\SYSTEM32\findstr.exe
      "findstr.exe" /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"
      2⤵
        PID:4956
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C "C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\loader.bat"
        2⤵
          PID:2312
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:3580
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:4456
          • C:\Users\Admin\AppData\Local\Temp\dropper.exe
            dropper.exe
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1860
            • C:\Windows\System32\Wbem\wmic.exe
              "wmic.exe" diskdrive get Model
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3120
            • C:\Windows\SYSTEM32\findstr.exe
              "findstr.exe" /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"
              3⤵
                PID:2808

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\loader.bat

            Filesize

            20B

            MD5

            3f3a41bd8b90767fc6aac3793137c6f3

            SHA1

            8709a86ed2364a4daf7c443770b1f3fefc6d7529

            SHA256

            41b9efbeb8fe9a6f96a7ad64edbf1d06a24d5d4574d380191411af3d64614c80

            SHA512

            7555b2ec9e6b0a2c1eaaff954b0a7d5421f1b5b79b38261d5d5c1d5b41699047a2db2593b679ac454cd5e083508961d5689f5880136faf2470e9219463c37dc8

          • memory/3236-38-0x000002F8E8D50000-0x000002F8E8F00000-memory.dmp

            Filesize

            1.7MB

          • memory/3236-43-0x000002F8E8B40000-0x000002F8E8B80000-memory.dmp

            Filesize

            256KB

          • memory/3236-23-0x000002F8E7750000-0x000002F8E7780000-memory.dmp

            Filesize

            192KB

          • memory/3236-18-0x000002F8E6990000-0x000002F8E69B0000-memory.dmp

            Filesize

            128KB

          • memory/3236-64-0x000002F8EA780000-0x000002F8EA7C0000-memory.dmp

            Filesize

            256KB

          • memory/3236-8-0x000002F8E6960000-0x000002F8E6990000-memory.dmp

            Filesize

            192KB

          • memory/3236-28-0x000002F8E6A70000-0x000002F8E6A90000-memory.dmp

            Filesize

            128KB

          • memory/3236-2-0x000002F8E78B0000-0x000002F8E8540000-memory.dmp

            Filesize

            12.6MB

          • memory/3236-13-0x000002F8E6A20000-0x000002F8E6A70000-memory.dmp

            Filesize

            320KB

          • memory/3236-59-0x000002F8EAD40000-0x000002F8EAF40000-memory.dmp

            Filesize

            2.0MB

          • memory/3236-54-0x000002F8EA9B0000-0x000002F8EAA60000-memory.dmp

            Filesize

            704KB

          • memory/3236-74-0x000002F8EAF90000-0x000002F8EAFE0000-memory.dmp

            Filesize

            320KB

          • memory/3236-69-0x000002F8EAAD0000-0x000002F8EAB10000-memory.dmp

            Filesize

            256KB

          • memory/3236-49-0x000002F8EA830000-0x000002F8EA8A0000-memory.dmp

            Filesize

            448KB

          • memory/3236-79-0x000002F8EB0C0000-0x000002F8EB150000-memory.dmp

            Filesize

            576KB

          • memory/3236-33-0x000002F8E8740000-0x000002F8E8760000-memory.dmp

            Filesize

            128KB