Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2024 18:06

General

  • Target

    0fbad12595c3ecd37ed2249d25161c3935485a2c761c104e58973841becd0517.exe

  • Size

    266KB

  • MD5

    b611b18150ff90f659198e46c7f2b74f

  • SHA1

    bb6bcaf535bddc8b793a8fa890bbbe7a33290faa

  • SHA256

    0fbad12595c3ecd37ed2249d25161c3935485a2c761c104e58973841becd0517

  • SHA512

    7d934c5875b9f984a1ff5576a4a3dd357a2f1ce54c282cae3a71a57415ad75ac570b0b7e02b32672c7f0bbb7b20f22438ab3765f033c0ee61cfb246bc6fe2b0e

  • SSDEEP

    6144:ty72/oopck5kxnvEL3T0Lq5TmSqMLMHgo2TWnF+v:tyQoomYEg9qrHgo2anAv

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fbad12595c3ecd37ed2249d25161c3935485a2c761c104e58973841becd0517.exe
    "C:\Users\Admin\AppData\Local\Temp\0fbad12595c3ecd37ed2249d25161c3935485a2c761c104e58973841becd0517.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2308 -s 228
        3⤵
          PID:2504

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Roaming\569D45D496681681895587\569D45D496681681895587.exe

      Filesize

      266KB

      MD5

      b611b18150ff90f659198e46c7f2b74f

      SHA1

      bb6bcaf535bddc8b793a8fa890bbbe7a33290faa

      SHA256

      0fbad12595c3ecd37ed2249d25161c3935485a2c761c104e58973841becd0517

      SHA512

      7d934c5875b9f984a1ff5576a4a3dd357a2f1ce54c282cae3a71a57415ad75ac570b0b7e02b32672c7f0bbb7b20f22438ab3765f033c0ee61cfb246bc6fe2b0e

    • memory/2308-7-0x000007FFFFFD4000-0x000007FFFFFD5000-memory.dmp

      Filesize

      4KB

    • memory/2308-11-0x0000000140000000-0x0000000140049000-memory.dmp

      Filesize

      292KB