Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-01-2025 19:35

General

  • Target

    earlyBuild.exe

  • Size

    6.1MB

  • MD5

    c78621d331c1b49744b469ba7dd7f414

  • SHA1

    83eb55f7728c7f9d7cd83d398ab1ced176b082b6

  • SHA256

    912e2b3852a85d651a08efe238290f759bbadebbc79772b989aaa57b5857e4ee

  • SHA512

    cd195b0338659e8d295f9ed2eb8d3002487c3c1320935197dfbcc195e2af8940aec8933251f2e4df3a91ebeeba2fa8074f51b606ccb040200476e6ac467ee0d0

  • SSDEEP

    196608:bSkSIlLTUcwti7TQl2NgVg01MWAXAkuujCPX9YG9he5GnQCAJKN:OkSopwtQQl2aOtXADu8X9Y95GQLJ

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\earlyBuild.exe
    "C:\Users\Admin\AppData\Local\Temp\earlyBuild.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\3313749f-c531-48a2-af36-1662bd169b6a.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2308
        • C:\Windows\system32\taskkill.exe
          taskkill /F /PID 2168
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1964
        • C:\Windows\system32\timeout.exe
          timeout /T 2 /NOBREAK
          3⤵
          • Delays execution with timeout.exe
          PID:2460

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\3313749f-c531-48a2-af36-1662bd169b6a.bat

      Filesize

      152B

      MD5

      b758810af2526ef048c209722dc8ff43

      SHA1

      482ea0019be7d2319d36957498c8b7ec45483506

      SHA256

      c51354f8e54616181a34499b46ab392917c138ff50432fa8c80d6530f601d690

      SHA512

      cd64f1d55015a68c3c9d48a883e6c7ba41cc911367fd4f8ca87d4fdd53548853eff610087a642aaf8b677ac936d51c9d5c6e6605981af59ce946048d4ddc744c

    • C:\Users\Admin\AppData\Local\Temp\CabEA51.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarEA73.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • memory/2168-0-0x000007FEF56A3000-0x000007FEF56A4000-memory.dmp

      Filesize

      4KB

    • memory/2168-1-0x0000000000F80000-0x0000000001596000-memory.dmp

      Filesize

      6.1MB

    • memory/2168-2-0x000007FEF56A0000-0x000007FEF608C000-memory.dmp

      Filesize

      9.9MB

    • memory/2168-264-0x000007FEF56A0000-0x000007FEF608C000-memory.dmp

      Filesize

      9.9MB