Analysis

  • max time kernel
    95s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 07:21

General

  • Target

    9ce9057feff7a9e9c750eae2ab2e50a004e5a7beff471de7b2dc28a41b34bf6b.exe

  • Size

    31.3MB

  • MD5

    aef178762ba9f72b9b4515f1772e80b6

  • SHA1

    6acf797484117a8ff058029a0806c08b82f32954

  • SHA256

    9ce9057feff7a9e9c750eae2ab2e50a004e5a7beff471de7b2dc28a41b34bf6b

  • SHA512

    370ddee9445e2ab6200da24cc73f0ff08db682a9ba18d018c4c98d83aed0f35662fb28524c61f445f61591f52956cd6082c1668b7ca4a232a25ae17809baaa7a

  • SSDEEP

    786432:zO2PsT1ywB80O57/Y8sqa7FV1xX6Oq6UXirV9Md8Ww:zO2PsRywB8j5sAapvxXTamCtw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ce9057feff7a9e9c750eae2ab2e50a004e5a7beff471de7b2dc28a41b34bf6b.exe
    "C:\Users\Admin\AppData\Local\Temp\9ce9057feff7a9e9c750eae2ab2e50a004e5a7beff471de7b2dc28a41b34bf6b.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\is-G32RB.tmp\9ce9057feff7a9e9c750eae2ab2e50a004e5a7beff471de7b2dc28a41b34bf6b.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-G32RB.tmp\9ce9057feff7a9e9c750eae2ab2e50a004e5a7beff471de7b2dc28a41b34bf6b.tmp" /SL5="$50234,31822156,823808,C:\Users\Admin\AppData\Local\Temp\9ce9057feff7a9e9c750eae2ab2e50a004e5a7beff471de7b2dc28a41b34bf6b.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Users\Admin\AppData\Roaming\807a338fc\7c482eef2.exe
        "C:\Users\Admin\AppData\Roaming\807a338fc\7c482eef2.exe" -p3fe9b3db2fb4e3 -y -o"C:\Users\Admin\AppData\Local\Temp\is-CK341.tmp\..\63510836948362680197471318\"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4668
      • C:\Users\Admin\AppData\Roaming\807a338fc\1d776d1b.exe
        "C:\Users\Admin\AppData\Roaming\807a338fc\1d776d1b.exe" -p8c4c3197b2ed -y -o"C:\Users\Admin\AppData\Local\Temp\is-CK341.tmp\..\63510836948362680197471318\"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4576
      • C:\Users\Admin\AppData\Local\Temp\63510836948362680197471318\soiucosxz.exe
        "C:\Users\Admin\AppData\Local\Temp\is-CK341.tmp\..\63510836948362680197471318\soiucosxz.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Enumerates connected drives
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1792
  • C:\Windows\system32\cmd.exe
    cmd /c start "" "C:\Users\Admin\AppData\Local\Temp\is-CK341.tmp\..\63510836948362680197471318\soiucosxz.exe" 3aede031690535070f390095f2d2 1792 "C:\Users\Admin\AppData\Local\Temp\is-CK341.tmp\..\63510836948362680197471318\"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Users\Admin\AppData\Local\Temp\63510836948362680197471318\soiucosxz.exe
      "C:\Users\Admin\AppData\Local\Temp\is-CK341.tmp\..\63510836948362680197471318\soiucosxz.exe" 3aede031690535070f390095f2d2 1792 "C:\Users\Admin\AppData\Local\Temp\is-CK341.tmp\..\63510836948362680197471318\"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      PID:3800
  • C:\Windows\MCcWniWCjWtG\soiucosxz.exe
    "C:\Windows\MCcWniWCjWtG\soiucosxz.exe"
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4084
    • C:\Windows\MCcWniWCjWtG\app-0.89.2\soiucosxz.exe
      "C:\Windows\MCcWniWCjWtG\app-0.89.2\soiucosxz.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4172
      • C:\Windows\MCcWniWCjWtG\app-0.89.2\app-0.89.2\soiucosxz.exe
        "C:\Windows\MCcWniWCjWtG\app-0.89.2\app-0.89.2\soiucosxz.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:5112
        • C:\Windows\MCcWniWCjWtG\app-0.89.2\app-0.89.2\soiucosxz.exe
          "C:\Windows\MCcWniWCjWtG\app-0.89.2\app-0.89.2\soiucosxz.exe" "2fb5d34656b943d916e57e9120"
          4⤵
            PID:4544
            • C:\Windows\system32\msconfig.exe
              C:\Windows\system32\msconfig.exe
              5⤵
                PID:3348
                • C:\Windows\MCcWniWCjWtG\app-0.89.2\app-0.89.2\soiucosxz.exe
                  "C:\Windows\MCcWniWCjWtG\app-0.89.2\app-0.89.2\soiucosxz.exe" bcbf6f4 4544
                  6⤵
                    PID:2648
        • C:\Windows\system32\cmd.exe
          cmd /c start "" "C:\Windows\MCcWniWCjWtG\app-0.89.2\app-0.89.2\soiucosxz.exe" 6c376dd8a 1792 "C:\Users\Admin\AppData\Local\Temp\is-CK341.tmp\..\63510836948362680197471318\"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:4804
          • C:\Windows\MCcWniWCjWtG\app-0.89.2\app-0.89.2\soiucosxz.exe
            "C:\Windows\MCcWniWCjWtG\app-0.89.2\app-0.89.2\soiucosxz.exe" 6c376dd8a 1792 "C:\Users\Admin\AppData\Local\Temp\is-CK341.tmp\..\63510836948362680197471318\"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1360

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\AB819CA4478D450CF3B95B908C7AD475

          Filesize

          520B

          MD5

          aa7ad7b0e041ed32c2619393177cb28d

          SHA1

          4a5c02a08fc64fb0b30d4d5fd225f8a94a384b41

          SHA256

          27952f168dab368902a8d20eb3d30e78dda60238d64e97d60fbbefeada36ef23

          SHA512

          0696d332325c35c76f1b9360e7b6669cb13b44a140ec38b79f61b55caabda743a6e17163d2b8b611ea3c2cf3b02c6d0b9143ac652627f124521b9b12272a403f

        • C:\Users\Admin\AppData\Local\Temp\63510836948362680197471318\8FF3EF380313034D8D84BAF59.cat

          Filesize

          10.9MB

          MD5

          9ea898b2095b6f751b020c3e294f2482

          SHA1

          09380f3924a961c7899b4bfa5f5f91515f9221a5

          SHA256

          3c0a526440055c1140cd62d1942c5035bb378b99c6f48f7dec0207e4791fa8e1

          SHA512

          e6a01f7d5e45ad65988b81107f10c15bce37221ef1da1d890fe2d1453efc8c1c2b33fd5de6c51bd72e18e9286c0ff06bd55d7fe2f068324aa15b0d34353476c5

        • C:\Users\Admin\AppData\Local\Temp\63510836948362680197471318\libcurl.dll

          Filesize

          556KB

          MD5

          6b2548cc404f3dd55634efa291fa98d0

          SHA1

          a076a60d99d70fd8aa7664a2534445a502febe27

          SHA256

          7ae384b8695d7a9c2b6640927cb6ac592229aef9ebeeb80b91d556777c6dfb5d

          SHA512

          14068e9e7d5f7e4494ffa75d369068234cdb050286d3356298e0387cf13d7681c0d68b57b6b299958c86ee3ae1dc3e54adc4c376e7b869d7d76fc2e91ed95009

        • C:\Users\Admin\AppData\Local\Temp\63510836948362680197471318\soiucosxz.exe

          Filesize

          2.2MB

          MD5

          6cf29dbf1fa710cccf6ba1c4c01f6b85

          SHA1

          a1debdb076c8c655e3d78c6ae82f1beba386a2ba

          SHA256

          f85ce4492e1354f8310027c5f70ef73aae654fcd8fd9a58034e4f82a41a9826b

          SHA512

          ebcc6599c33a80bb3e5c627a5f861fc9742d8558c4551544109288f80155885791a3f701af1aa7a4513cc5d121b77678a4cd46ca38a7bdd3cf7288e58e01f4f5

        • C:\Users\Admin\AppData\Local\Temp\63510836948362680197471318\zlibwapi.dll

          Filesize

          3.1MB

          MD5

          4d05d940fa3851c6322f11463f76fb85

          SHA1

          5502f7bf7bdaed6861044cb34cff08656c963775

          SHA256

          01f062fa5f11aebf8c2cd57fc148c3b4b1a64e97dcf68194c0545361973d6e94

          SHA512

          5cf57118e70228afad77368277bd2fc8de71172d9317b44b2147e68dd8dcbfaf3dcc052fcdf430870484ef281ffddbeaef96a9d00acb8de29b0d03bba01ae34c

        • C:\Users\Admin\AppData\Local\Temp\is-CK341.tmp\_isetup\_isdecmp.dll

          Filesize

          28KB

          MD5

          077cb4461a2767383b317eb0c50f5f13

          SHA1

          584e64f1d162398b7f377ce55a6b5740379c4282

          SHA256

          8287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64

          SHA512

          b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547

        • C:\Users\Admin\AppData\Local\Temp\is-G32RB.tmp\9ce9057feff7a9e9c750eae2ab2e50a004e5a7beff471de7b2dc28a41b34bf6b.tmp

          Filesize

          3.2MB

          MD5

          9b79bdccec683275f9527bb2aaaf0999

          SHA1

          52d087eec95fb4b224609559d63720e05b178156

          SHA256

          ee67d5a36a7bcb20aca3a8688ea5a07652575a1febf6c7708ab266cbc72747d7

          SHA512

          47979febaf20f40ee0734f34d159e1056a66c6d445637241213de666cfe4d181fa7194cd6b567ac3aefcf36489314a0493f087fb2440debe926f0e8d7f734989

        • C:\Users\Admin\AppData\Roaming\807a338fc\1d776d1b.exe

          Filesize

          14.9MB

          MD5

          2fb24df18e2861be07492281bec9f484

          SHA1

          273af996154ae600737467bea46cb6c7b07d2852

          SHA256

          a93bf79ed9e71079c3e54d795ef5046d2ac05cf332683a4f1dd90a8e3201072c

          SHA512

          14367623cf8ea957b4ffe0771c24f3eba4f5192d5b085768d4706781571df892247c54251ab0142e7a033e46bdab469c8ab57710d4188c621dee9423369c6b07

        • C:\Users\Admin\AppData\Roaming\807a338fc\7c482eef2.exe

          Filesize

          14.8MB

          MD5

          96954ca0f0e275060d6d868947973758

          SHA1

          ddbbeb20801719d110459eb39cc6e3cd7acf4bc9

          SHA256

          5e2c60eda616cc327c8b54973802677471ccf2ea20b6565b70182d9e28f1df07

          SHA512

          60d5c5a15f44cd787b809f82edb5f069197911f07ea2bba2f78c76294092d64e99e55d9d55912a148ea1296f2dd63d798f1baf54432776568731dced61edb33d

        • C:\Windows\MCcWniWCjWtG\app-0.89.2\app-0.89.2\8FF3EF380313034D8D84BAF59.cat

          Filesize

          6.1MB

          MD5

          329ce3c11eee62b9d8f6087f605bdc49

          SHA1

          2cd7f926b5584aafbb41a2bf51af121eede0ed95

          SHA256

          55e9170b28afce8e3cdcf957409139ff211b83c5e4cb50560615823c66a416c2

          SHA512

          48aa2ffe1e9692bcfafc5f060c6d7444dddbf0a8585a9323ef9d2fda5a5bec79f487b89ab51f1b7026b6748deebf88ebefad19578b015846ef4e8f9398543d0b

        • C:\Windows\MCcWniWCjWtG\app-0.89.2\app-0.89.2\zlibwapi.dll

          Filesize

          1.0MB

          MD5

          24cb34cacc6e1c539e58bd5cda620a29

          SHA1

          c6aaf4ce2b51ec487632b41d16b812cbf6b240d9

          SHA256

          5e4b57f8b3d39cc6f90e0e17b7d12d9f3eea67d1a1f2ee73c428c1388a7e65c3

          SHA512

          83d097955af0844280ee2b6df3173cb06275ed6be085089e2898cacedfc769c10c0870d2782f0180bec4f0c32c02b418b34a8082c29784393a3a4b7c8aa834ba

        • C:\Windows\MCcWniWCjWtG\soiucosxz.exe

          Filesize

          586KB

          MD5

          f6f6ff4e9b359bc005a25fadb3a0aa61

          SHA1

          831fe06ce2015e2d66467d04f2d46ec3e96524d3

          SHA256

          6eb2a5f8ba7b7e2438a9608b7a2d5eefa1f8b66aaf7060c208678e47c3565324

          SHA512

          db29271f28a3bff4bd3f4073b522c662f70865cc1067e0de2c11ef284d8d88fe9ca165485da6fe52372bf3db33764f195853b883d8fdab1b502e960b0915da14

        • memory/1360-115-0x000002499ADE0000-0x000002499B937000-memory.dmp

          Filesize

          11.3MB

        • memory/1360-114-0x000002499ADE0000-0x000002499B937000-memory.dmp

          Filesize

          11.3MB

        • memory/1360-100-0x00007FFB91EC0000-0x00007FFB91FC8000-memory.dmp

          Filesize

          1.0MB

        • memory/1760-2-0x0000000000B91000-0x0000000000C39000-memory.dmp

          Filesize

          672KB

        • memory/1760-46-0x0000000000B90000-0x0000000000C67000-memory.dmp

          Filesize

          860KB

        • memory/1760-0-0x0000000000B90000-0x0000000000C67000-memory.dmp

          Filesize

          860KB

        • memory/1792-62-0x000002A11CF30000-0x000002A11D1A3000-memory.dmp

          Filesize

          2.4MB

        • memory/1792-51-0x000002A11BAD0000-0x000002A11C627000-memory.dmp

          Filesize

          11.3MB

        • memory/1792-48-0x000002A119990000-0x000002A11A47B000-memory.dmp

          Filesize

          10.9MB

        • memory/1792-64-0x000002A11CF30000-0x000002A11D1A3000-memory.dmp

          Filesize

          2.4MB

        • memory/1792-61-0x000002A11CF30000-0x000002A11D1A3000-memory.dmp

          Filesize

          2.4MB

        • memory/1792-117-0x000002A11CF30000-0x000002A11D1A3000-memory.dmp

          Filesize

          2.4MB

        • memory/1792-50-0x000002A11BAD0000-0x000002A11C627000-memory.dmp

          Filesize

          11.3MB

        • memory/2648-138-0x00000218BD060000-0x00000218BD2D3000-memory.dmp

          Filesize

          2.4MB

        • memory/2648-135-0x00000218BBD90000-0x00000218BC8E7000-memory.dmp

          Filesize

          11.3MB

        • memory/2648-133-0x00000218BBD90000-0x00000218BC8E7000-memory.dmp

          Filesize

          11.3MB

        • memory/2648-131-0x00000218BBD90000-0x00000218BC8E7000-memory.dmp

          Filesize

          11.3MB

        • memory/2648-129-0x00007FFB91EC0000-0x00007FFB91FC8000-memory.dmp

          Filesize

          1.0MB

        • memory/2648-137-0x00000218BD060000-0x00000218BD2D3000-memory.dmp

          Filesize

          2.4MB

        • memory/2648-140-0x00000218BD060000-0x00000218BD2D3000-memory.dmp

          Filesize

          2.4MB

        • memory/2936-44-0x0000000000790000-0x0000000000AC6000-memory.dmp

          Filesize

          3.2MB

        • memory/2936-6-0x00000000015B0000-0x00000000015B1000-memory.dmp

          Filesize

          4KB

        • memory/3800-68-0x000002AFCA9E0000-0x000002AFCB537000-memory.dmp

          Filesize

          11.3MB

        • memory/3800-66-0x000002AFCA9E0000-0x000002AFCB537000-memory.dmp

          Filesize

          11.3MB

        • memory/4544-122-0x0000020754470000-0x0000020754FC7000-memory.dmp

          Filesize

          11.3MB

        • memory/4544-123-0x0000020754470000-0x0000020754FC7000-memory.dmp

          Filesize

          11.3MB

        • memory/4544-111-0x00007FFB91EC0000-0x00007FFB91FC8000-memory.dmp

          Filesize

          1.0MB

        • memory/5112-105-0x00000206BDE80000-0x00000206BE9D7000-memory.dmp

          Filesize

          11.3MB

        • memory/5112-103-0x00000206BDE80000-0x00000206BE9D7000-memory.dmp

          Filesize

          11.3MB

        • memory/5112-94-0x00007FFB91EC0000-0x00007FFB91FC8000-memory.dmp

          Filesize

          1.0MB