Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:58

General

  • Target

    System.exe

  • Size

    139.6MB

  • MD5

    a1bd7f9fcdb0b75d30fa9f0caac5d2a7

  • SHA1

    5602eb1782cb0de1aba91d3c06589be195c5dee8

  • SHA256

    7c878c82ccd577f3dad67fb1fe5e0b681f27ba9a741c79bfd9bbfa032dccde65

  • SHA512

    1befc5c99e4832dd5d53759c4ff6e24d9a6059e494573f84d3395c1473690d29ec1534f9fcce20ab54f811a69d4c443f862dc7ddb908c99037637105b58bf85e

  • SSDEEP

    786432:d14w5ThzHwQBgmoLWv+K18nCzKdo5DTdvfMQr6SSmPuvh8tSIW68:d14kpHwQjCWv+K18CedmVvEQEpcJW

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\System.exe
    "C:\Users\Admin\AppData\Local\Temp\System.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "tasklist"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\system32\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:2808
    • C:\Users\Admin\AppData\Local\Temp\System.exe
      "C:\Users\Admin\AppData\Local\Temp\System.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=988 --field-trial-handle=1156,7934876477860234694,1365077378137308632,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
      2⤵
        PID:2824
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "wmic process where processid=NaN get ExecutablePath"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:604
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic process where processid=NaN get ExecutablePath
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:824
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "tasklist"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1864
        • C:\Windows\system32\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2892
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /d /s /c "net session"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2844
        • C:\Windows\system32\net.exe
          net session
          3⤵
            PID:2900
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 session
              4⤵
                PID:3036
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "wmic logicaldisk get size"
            2⤵
              PID:2560
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic logicaldisk get size
                3⤵
                • Collects information from the system
                PID:1720
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "wmic computersystem get totalphysicalmemory | more +1"
              2⤵
                PID:1796
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic computersystem get totalphysicalmemory
                  3⤵
                    PID:1976
                  • C:\Windows\system32\more.com
                    more +1
                    3⤵
                      PID:1736
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /d /s /c "wmic csproduct get uuid"
                    2⤵
                      PID:2084
                      • C:\Windows\System32\Wbem\WMIC.exe
                        wmic csproduct get uuid
                        3⤵
                          PID:1756
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /d /s /c "echo %NUMBER_OF_PROCESSORS%"
                        2⤵
                          PID:1752
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /d /s /c "wmic OS get caption, osarchitecture | more +1"
                          2⤵
                            PID:1808
                            • C:\Windows\System32\Wbem\WMIC.exe
                              wmic OS get caption, osarchitecture
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2748
                            • C:\Windows\system32\more.com
                              more +1
                              3⤵
                                PID:2588
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get name | more +1"
                              2⤵
                                PID:2088
                                • C:\Windows\System32\Wbem\WMIC.exe
                                  wmic cpu get name
                                  3⤵
                                    PID:1036
                                  • C:\Windows\system32\more.com
                                    more +1
                                    3⤵
                                      PID:2196
                                  • C:\Users\Admin\AppData\Local\Temp\System.exe
                                    "C:\Users\Admin\AppData\Local\Temp\System.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --mojo-platform-channel-handle=1612 --field-trial-handle=1156,7934876477860234694,1365077378137308632,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1760
                                  • C:\Users\Admin\AppData\Local\Temp\System.exe
                                    "C:\Users\Admin\AppData\Local\Temp\System.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\script" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1616 --field-trial-handle=1156,7934876477860234694,1365077378137308632,131072 --disable-features=PlzServiceWorker,SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                    2⤵
                                      PID:1696
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /d /s /c "wmic PATH Win32_VideoController get name | more +1"
                                      2⤵
                                        PID:1560
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic PATH Win32_VideoController get name
                                          3⤵
                                          • Detects videocard installed
                                          PID:1916
                                        • C:\Windows\system32\more.com
                                          more +1
                                          3⤵
                                            PID:928
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                          2⤵
                                            PID:400
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                              3⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:1164

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • \Users\Admin\AppData\Local\Temp\565a67b7-12c1-4549-8d25-894704b5c5d1.tmp.node

                                          Filesize

                                          643KB

                                          MD5

                                          d549d81caf247e8779887b59b5605d67

                                          SHA1

                                          a6b04e526da738b6501a6b570cef2146ea516ae6

                                          SHA256

                                          67e5b369c0dcafe09077eabc98662d37218b1b081373a6b18ab980b8e3c84bef

                                          SHA512

                                          eb3f831a594b9290075be6b5b338a4b13c596c174b8c97b466d3b1eff00386ffdee9e0598a4fa45c3a3de6028bfafa462e8b87e458f79b67646d3f02705438a6

                                        • \Users\Admin\AppData\Local\Temp\7d8fbeaa-affe-4ad7-9f03-ff66ea9b5683.tmp.node

                                          Filesize

                                          1.8MB

                                          MD5

                                          3072b68e3c226aff39e6782d025f25a8

                                          SHA1

                                          cf559196d74fa490ac8ce192db222c9f5c5a006a

                                          SHA256

                                          7fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01

                                          SHA512

                                          61ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61

                                        • memory/1164-117-0x000000001B630000-0x000000001B912000-memory.dmp

                                          Filesize

                                          2.9MB

                                        • memory/1164-118-0x0000000002320000-0x0000000002328000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2824-9-0x0000000000060000-0x0000000000061000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2824-41-0x0000000077170000-0x0000000077171000-memory.dmp

                                          Filesize

                                          4KB