Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24-09-2024 08:21

General

  • Target

    20240923_install.exe

  • Size

    6.1MB

  • MD5

    af3b09dc8f43ff7698b730ff6b784ad7

  • SHA1

    64b493ed97860eb865e8d43f51c1adf81dd712c9

  • SHA256

    afd5e03f10dbda275fc21e9e6b2387c99ee8f5977df22cd395082b9f825a2623

  • SHA512

    edf170607e74fbbabc29ff50efb2be30baa0e12a231e9ab131380ef842ce4e7874b2e03fd6acabd2b9f05a33ee1b855c3afccc43cecfbbf2b213acae65dc6efe

  • SSDEEP

    98304:efRnOrG2ohf0kGVrr0K4aueL2hbiD9kl7fIJJDKnD0F9OuuJFVyYU8tK:epeGjhMk60gTwbi6IoM9O3JFV5U8tK

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs
    1⤵
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs
      2⤵
      • Suspicious use of SetThreadContext
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\Windows\system32\dllhost.exe
        C:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2716
    • C:\Windows\system32\wbem\WMIADAP.EXE
      wmiadap.exe /F /T /R
      2⤵
        PID:1780
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1180
        • C:\Users\Admin\AppData\Local\Temp\20240923_install.exe
          "C:\Users\Admin\AppData\Local\Temp\20240923_install.exe"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2944
        • C:\Users\Admin\AppData\Local\Temp\assist.exe
          "C:\Users\Admin\AppData\Local\Temp\assist.exe"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2352
      • C:\Program Files\Windows NT\assist.exe
        "C:\Program Files\Windows NT\assist.exe"
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2436

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/848-56-0x0000000000C80000-0x0000000000CE8000-memory.dmp

        Filesize

        416KB

      • memory/848-58-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

        Filesize

        4KB

      • memory/1180-31-0x0000000007920000-0x0000000007CD8000-memory.dmp

        Filesize

        3.7MB

      • memory/1180-40-0x0000000002550000-0x0000000002551000-memory.dmp

        Filesize

        4KB

      • memory/1180-29-0x0000000002540000-0x0000000002541000-memory.dmp

        Filesize

        4KB

      • memory/2352-47-0x0000000077101000-0x0000000077202000-memory.dmp

        Filesize

        1.0MB

      • memory/2352-41-0x0000000140000000-0x00000001401AB000-memory.dmp

        Filesize

        1.7MB

      • memory/2352-42-0x0000000180000000-0x000000018006A000-memory.dmp

        Filesize

        424KB

      • memory/2352-46-0x0000000077100000-0x00000000772A9000-memory.dmp

        Filesize

        1.7MB

      • memory/2352-70-0x000007FEF59B0000-0x000007FEF5C2B000-memory.dmp

        Filesize

        2.5MB

      • memory/2436-62-0x000007FEF59B0000-0x000007FEF5C2B000-memory.dmp

        Filesize

        2.5MB

      • memory/2436-61-0x0000000077100000-0x00000000772A9000-memory.dmp

        Filesize

        1.7MB

      • memory/2436-49-0x0000000077100000-0x00000000772A9000-memory.dmp

        Filesize

        1.7MB

      • memory/2436-63-0x0000000077100000-0x00000000772A9000-memory.dmp

        Filesize

        1.7MB

      • memory/2436-54-0x0000000077100000-0x00000000772A9000-memory.dmp

        Filesize

        1.7MB

      • memory/2436-48-0x0000000140000000-0x00000001401AB000-memory.dmp

        Filesize

        1.7MB

      • memory/2688-77-0x0000000000060000-0x0000000000061000-memory.dmp

        Filesize

        4KB

      • memory/2688-83-0x0000000077100000-0x00000000772A9000-memory.dmp

        Filesize

        1.7MB

      • memory/2716-100-0x0000000077100000-0x00000000772A9000-memory.dmp

        Filesize

        1.7MB

      • memory/2944-11-0x0000000001B90000-0x0000000001B9A000-memory.dmp

        Filesize

        40KB

      • memory/2944-12-0x0000000001D80000-0x0000000001D8A000-memory.dmp

        Filesize

        40KB

      • memory/2944-22-0x00000000020C0000-0x00000000020CA000-memory.dmp

        Filesize

        40KB

      • memory/2944-21-0x0000000001D80000-0x0000000001D8A000-memory.dmp

        Filesize

        40KB

      • memory/2944-20-0x0000000001D80000-0x0000000001D81000-memory.dmp

        Filesize

        4KB

      • memory/2944-13-0x0000000001D80000-0x0000000001D8A000-memory.dmp

        Filesize

        40KB

      • memory/2944-14-0x0000000001EA0000-0x0000000001EAA000-memory.dmp

        Filesize

        40KB

      • memory/2944-15-0x0000000001EA0000-0x0000000001EAA000-memory.dmp

        Filesize

        40KB

      • memory/2944-39-0x00000000020C0000-0x00000000020CD000-memory.dmp

        Filesize

        52KB

      • memory/2944-16-0x0000000001EA0000-0x0000000001EAA000-memory.dmp

        Filesize

        40KB

      • memory/2944-17-0x0000000001EA0000-0x0000000001EAA000-memory.dmp

        Filesize

        40KB

      • memory/2944-18-0x0000000001D80000-0x0000000001D8A000-memory.dmp

        Filesize

        40KB

      • memory/2944-19-0x0000000001EA0000-0x0000000001EAA000-memory.dmp

        Filesize

        40KB

      • memory/2944-23-0x0000000180000000-0x000000018000D000-memory.dmp

        Filesize

        52KB

      • memory/2944-9-0x0000000001EA0000-0x0000000001EAA000-memory.dmp

        Filesize

        40KB

      • memory/2944-10-0x0000000001B90000-0x0000000001B9A000-memory.dmp

        Filesize

        40KB

      • memory/2944-0-0x0000000001B90000-0x0000000001B9A000-memory.dmp

        Filesize

        40KB

      • memory/2944-1-0x0000000001B90000-0x0000000001B9A000-memory.dmp

        Filesize

        40KB

      • memory/2944-2-0x0000000001D80000-0x0000000001D8A000-memory.dmp

        Filesize

        40KB

      • memory/2944-3-0x0000000001D80000-0x0000000001D8A000-memory.dmp

        Filesize

        40KB

      • memory/2944-4-0x0000000001D80000-0x0000000001D8A000-memory.dmp

        Filesize

        40KB

      • memory/2944-5-0x0000000001D80000-0x0000000001D8A000-memory.dmp

        Filesize

        40KB

      • memory/2944-6-0x0000000001EA0000-0x0000000001EAA000-memory.dmp

        Filesize

        40KB

      • memory/2944-7-0x0000000001EA0000-0x0000000001EAA000-memory.dmp

        Filesize

        40KB

      • memory/2944-8-0x0000000001D80000-0x0000000001D8A000-memory.dmp

        Filesize

        40KB