Resubmissions

15/01/2025, 15:44

250115-s6kp1axjhs 10

15/01/2025, 14:52

250115-r81cssxlgr 10

15/01/2025, 14:49

250115-r7dseawjhs 10

Analysis

  • max time kernel
    19s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/01/2025, 14:52

General

  • Target

    e7d30fd97d59ed644b2344b8cf8e1d86531032474542f2bba1bc253cffcf5864.exe

  • Size

    6.1MB

  • MD5

    df8186565b9760042af7f12fb42a2de2

  • SHA1

    11311a96335df5237fa479716365bffd8004a103

  • SHA256

    e7d30fd97d59ed644b2344b8cf8e1d86531032474542f2bba1bc253cffcf5864

  • SHA512

    4f84deddf8d3290f7a8ed8cae7f571e04a2334b5ecae31b57f545099ec56d3f11fcea16dd5b190a69c203930a909ef7bf03536499c19c402693bc59f9dd3651f

  • SSDEEP

    196608:2SkSIlLTUcwti7TQl2NgVg01MWAXAkuujCPX9YG9he5GnQCAJKN:HkSopwtQQl2aOtXADu8X9Y95GQLJ

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7d30fd97d59ed644b2344b8cf8e1d86531032474542f2bba1bc253cffcf5864.exe
    "C:\Users\Admin\AppData\Local\Temp\e7d30fd97d59ed644b2344b8cf8e1d86531032474542f2bba1bc253cffcf5864.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\f2266a7d-2de2-4cc7-94cc-40aeba9abd85.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:748
        • C:\Windows\system32\taskkill.exe
          taskkill /F /PID 2340
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:564
        • C:\Windows\system32\timeout.exe
          timeout /T 2 /NOBREAK
          3⤵
          • Delays execution with timeout.exe
          PID:2124

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Cab91E5.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar91F8.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • C:\Users\Admin\AppData\Local\Temp\f2266a7d-2de2-4cc7-94cc-40aeba9abd85.bat

      Filesize

      152B

      MD5

      7880ed344fa33bbf6e402594e2046212

      SHA1

      e62c7c86f0ad6c9b1f078fe9449270e9eb7a42e1

      SHA256

      4a9db40e95f431a602e65034bddfd3363704cb6deb1c7221128a9626acff7dd9

      SHA512

      24e7c4d1914e616e716ece0cf8ea80d42a5fee71ee35fe31367592b308f2ceb1560cb07b61de01ab029ea20eded484455b54285289fbbc82665dc54e1cb7f21f

    • memory/2340-0-0x000007FEF5B03000-0x000007FEF5B04000-memory.dmp

      Filesize

      4KB

    • memory/2340-1-0x0000000000A60000-0x0000000001076000-memory.dmp

      Filesize

      6.1MB

    • memory/2340-2-0x000007FEF5B00000-0x000007FEF64EC000-memory.dmp

      Filesize

      9.9MB

    • memory/2340-264-0x000007FEF5B00000-0x000007FEF64EC000-memory.dmp

      Filesize

      9.9MB