Analysis

  • max time kernel
    91s
  • max time network
    96s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-09-2024 05:47

General

  • Target

    dropper.exe

  • Size

    33.5MB

  • MD5

    5e84cd460ac5eb9ee72dd2f831297b52

  • SHA1

    17960e740ac5596b5025ab0515383df0db3b8753

  • SHA256

    8c473bf936fd8076a2330dbc420ed96b96a6169f747aab0129705e1d4e57309d

  • SHA512

    c670120cea8eef9ff2f017e1d13470774a155cbc5e47877adf45ed37a91afa89eee6903fd7b848d99a5cd0aed4c5619541928ea0ed63caeb866c0a68ca1a14de

  • SSDEEP

    786432:lkghL+KScDz/3G5qz0dwUOA9ZCVgQKwWCIPwUT49Zf3/b:agB7Db25qz0dQAUgGXIPwbZnb

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dropper.exe
    "C:\Users\Admin\AppData\Local\Temp\dropper.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4716
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" diskdrive get Model
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3720
    • C:\Windows\SYSTEM32\findstr.exe
      "findstr.exe" /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"
      2⤵
        PID:5068
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /C "C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\loader.bat"
        2⤵
          PID:2744
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:1848
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2172
          • C:\Users\Admin\AppData\Local\Temp\dropper.exe
            dropper.exe
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3524
            • C:\Windows\System32\Wbem\wmic.exe
              "wmic.exe" diskdrive get Model
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:764
            • C:\Windows\SYSTEM32\findstr.exe
              "findstr.exe" /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"
              3⤵
                PID:2132

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\loader.bat

            Filesize

            20B

            MD5

            3f3a41bd8b90767fc6aac3793137c6f3

            SHA1

            8709a86ed2364a4daf7c443770b1f3fefc6d7529

            SHA256

            41b9efbeb8fe9a6f96a7ad64edbf1d06a24d5d4574d380191411af3d64614c80

            SHA512

            7555b2ec9e6b0a2c1eaaff954b0a7d5421f1b5b79b38261d5d5c1d5b41699047a2db2593b679ac454cd5e083508961d5689f5880136faf2470e9219463c37dc8

          • memory/4716-44-0x000002C69CDF0000-0x000002C69CFF0000-memory.dmp

            Filesize

            2.0MB

          • memory/4716-32-0x000002C69A960000-0x000002C69A9A0000-memory.dmp

            Filesize

            256KB

          • memory/4716-16-0x000002C6989E0000-0x000002C698A10000-memory.dmp

            Filesize

            192KB

          • memory/4716-8-0x0000028603930000-0x0000028603980000-memory.dmp

            Filesize

            320KB

          • memory/4716-48-0x000002C69C950000-0x000002C69C990000-memory.dmp

            Filesize

            256KB

          • memory/4716-0-0x000002C699720000-0x000002C69A3B0000-memory.dmp

            Filesize

            12.6MB

          • memory/4716-20-0x000002C698990000-0x000002C6989B0000-memory.dmp

            Filesize

            128KB

          • memory/4716-12-0x00000286039C0000-0x00000286039E0000-memory.dmp

            Filesize

            128KB

          • memory/4716-4-0x0000028601EF0000-0x0000028601F20000-memory.dmp

            Filesize

            192KB

          • memory/4716-40-0x000002C69CA60000-0x000002C69CB10000-memory.dmp

            Filesize

            704KB

          • memory/4716-36-0x000002C69C8E0000-0x000002C69C950000-memory.dmp

            Filesize

            448KB

          • memory/4716-56-0x000002C69CFF0000-0x000002C69D040000-memory.dmp

            Filesize

            320KB

          • memory/4716-52-0x000002C69CB50000-0x000002C69CB90000-memory.dmp

            Filesize

            256KB

          • memory/4716-60-0x000002C69D120000-0x000002C69D1B0000-memory.dmp

            Filesize

            576KB

          • memory/4716-29-0x000002C69AB70000-0x000002C69AD20000-memory.dmp

            Filesize

            1.7MB

          • memory/4716-24-0x000002C698A30000-0x000002C698A50000-memory.dmp

            Filesize

            128KB