Analysis

  • max time kernel
    21s
  • max time network
    24s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2025 04:02

General

  • Target

    c7ac99bcc4da738591f52c91fd6ef86533a83a944e68be031c11f0484ed2f5bdN.exe

  • Size

    3.6MB

  • MD5

    ec6412e356b57c420abd26cccdb8c140

  • SHA1

    0f386e23c2a088a017cdf5aba237ff816265285a

  • SHA256

    c7ac99bcc4da738591f52c91fd6ef86533a83a944e68be031c11f0484ed2f5bd

  • SHA512

    9ea1acccbc13cbb2566eb97e39e7b40bf3b4b7f214122a72d941e4563de6eae244b6bb3c632d569254101aa8f12adf6ade2e068430a8b7e103b8113306cef1cb

  • SSDEEP

    98304:kkqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13U:kkSIlLtzWAXAkuujCPX9YG9he5GnQCAB

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7ac99bcc4da738591f52c91fd6ef86533a83a944e68be031c11f0484ed2f5bdN.exe
    "C:\Users\Admin\AppData\Local\Temp\c7ac99bcc4da738591f52c91fd6ef86533a83a944e68be031c11f0484ed2f5bdN.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\e7bf60e2-9597-4a1a-b254-43a9bf506548.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:1308
        • C:\Windows\system32\taskkill.exe
          taskkill /F /PID 1268
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1928
        • C:\Windows\system32\timeout.exe
          timeout /T 2 /NOBREAK
          3⤵
          • Delays execution with timeout.exe
          PID:1040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Cab8DD0.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar8E50.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\e7bf60e2-9597-4a1a-b254-43a9bf506548.bat

      Filesize

      152B

      MD5

      79d1b0ec5b14e26afe679605220cc37a

      SHA1

      14095743c008cf0c69805512ba32b32058743204

      SHA256

      28433a0af251f4a4d3ef48731840f483327ac780b4dcbe579b992e16050322d5

      SHA512

      6ef98ad65ae376a3b76e9aae4cfc9d91f0fc38f4558186514a318a82154844958f682cb7eeb462f730cb8089583e242860acdb046d103993d86308666812872c

    • memory/1268-0-0x000007FEF6253000-0x000007FEF6254000-memory.dmp

      Filesize

      4KB

    • memory/1268-1-0x0000000000900000-0x0000000000C9A000-memory.dmp

      Filesize

      3.6MB

    • memory/1268-2-0x000007FEF6250000-0x000007FEF6C3C000-memory.dmp

      Filesize

      9.9MB

    • memory/1268-163-0x000007FEF6253000-0x000007FEF6254000-memory.dmp

      Filesize

      4KB

    • memory/1268-164-0x000007FEF6250000-0x000007FEF6C3C000-memory.dmp

      Filesize

      9.9MB

    • memory/1268-275-0x000007FEF6250000-0x000007FEF6C3C000-memory.dmp

      Filesize

      9.9MB