Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2025, 13:06

General

  • Target

    random.exe

  • Size

    846KB

  • MD5

    c3d89e95bfb66f5127ac1f2f3e1bd665

  • SHA1

    bd79a4a17cc8ad63abdde20d9de02d55d54903f9

  • SHA256

    5d07ad572a6a37d07d0b7ca990087960ad8850d7cfc56b8c7270c826c70fb56b

  • SHA512

    d85116e24cf07f3063837fab1859ae6d9313dd269e28844900cbebe7521df8c65db97bc122bb097e9887d686bdf8f786b93a06208d762fded9035d2c6448a111

  • SSDEEP

    24576:+VIFvGC3R+NVgcijiCnjWii1bAL3ztlmAQJut:Cg2VghqVRKz6AQwt

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\random.exe
    "C:\Users\Admin\AppData\Local\Temp\random.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy Turner Turner.cmd & Turner.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1072
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2244
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2224
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1604
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 764661
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2356
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Fm
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2496
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Tunnel" Addresses
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2620
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 764661\Macromedia.com + Totally + York + Drunk + Baghdad + Benz + Glasses + Pac + Tender + Racing + Deluxe + Derived 764661\Macromedia.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2696
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Complement + ..\Soundtrack + ..\Plumbing + ..\Hills F
        3⤵
        • System Location Discovery: System Language Discovery
        PID:596
      • C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.com
        Macromedia.com F
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /create /tn "AchillesGuard" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GuardTech Solutions\AchillesGuard.js'" /sc onlogon /F /RL HIGHEST
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:2864
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          4⤵
            PID:1612
        • C:\Windows\SysWOW64\choice.exe
          choice /d y /t 15
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\764661\F

      Filesize

      230KB

      MD5

      47840b8162b9c6e7fe90ab0603d61f93

      SHA1

      2bcfbadfa40e35f1ef64e4a048f2df2e03ffbb5a

      SHA256

      5e0f8bf19cc0e550fbc57f447e5b07597b9a2b04a71a4e67b10eb616f114d90b

      SHA512

      9cf08d2f0bc4987b199bd893d398950a71a3a4a0f568da94aef236a9928b0b07b6ea54dfae967e36c2c518a7c715a52d083c50ddcabe3a439c87e6153caddb00

    • C:\Users\Admin\AppData\Local\Temp\764661\Macromedia.com

      Filesize

      50KB

      MD5

      eaa9eac7b30831d5657349c116a0a4a2

      SHA1

      641e627a4c59abb2a3f1648e3cda6a8d9e1f4fcb

      SHA256

      c17f2fd61daf4ba0aa1e46fb3c1408d300d1bb46b02f7363452baad47d77f5d1

      SHA512

      61b39232328c7a9de8b83d35ce98ebc819d89043595afb9d36714a7c69966901d671af0b25d0a1d0becfefde5cdd59e2340e69cecbab1b0f686c61e35fd0c964

    • C:\Users\Admin\AppData\Local\Temp\Addresses

      Filesize

      764B

      MD5

      41c199d56ee88613939ba36689b5272f

      SHA1

      c8ea27720461568200a6b1e65b26fcf34e0c40fa

      SHA256

      bc9e83d6b316359195dd0e515be2163998a0100587f2f8a2105352afc8ef48e4

      SHA512

      66511d865cdeb5039a660cd9551477c126d36eccaafa189c4c3dd97a31d4009a772e4138efc05ea0a840310c2f7b9a8ea1257432c310b706a06d9b052d306df2

    • C:\Users\Admin\AppData\Local\Temp\Baghdad

      Filesize

      122KB

      MD5

      db32131c3970c57d0ad200b8c586b9c8

      SHA1

      adb5d20e012b668ad6cc77c166ade302607795dc

      SHA256

      edd149ee8fc4e9ba7b0633b0b34bbc60f49fd4af949bbd06cdc46effcf9ec4a5

      SHA512

      d57b106d8cfee5459492e945cfd2d1c28727b5f8e1e48c7ec39f64d1f1c0856d7a898b2e6abe964abca2df610e4d6384c14696fe79d6da87c6ac52dbc85e4783

    • C:\Users\Admin\AppData\Local\Temp\Benz

      Filesize

      64KB

      MD5

      ec2a94df8c01a560e0604c640b26ccdd

      SHA1

      1ac09f3302b2df40302a050cee5ba5b119291215

      SHA256

      f0d88e80b23da7e59e76dd18d6b39737c577df9689ae49126ccafe5fbaeb5b5b

      SHA512

      bbe7b24db1451d425e3b241075ed6dc564d798fa504b3e0d75edf876e582599d1709836062fbc7d5175d85eb179b635db3c940a89c20863f9dcd739b0f8b44ec

    • C:\Users\Admin\AppData\Local\Temp\Complement

      Filesize

      59KB

      MD5

      dfb8e34f07291b05901c0d2a71e19442

      SHA1

      1b54535721482c0a3db1760541367a03deedc8c5

      SHA256

      0cb98ad246cd2531c12ec31fe31a0c5afbef269c9c913eb06de547d3730ddcc7

      SHA512

      09b5f13637608bcd1862b0d56af361c6acbe5f0100314fffe48a7f2266fb8d2bcc60ee9da5716ce20b73fefac9d6126f3488b12a44b2ac6f396f9051b5700379

    • C:\Users\Admin\AppData\Local\Temp\Deluxe

      Filesize

      131KB

      MD5

      7aa824f055dc532c3e713734d5733577

      SHA1

      d354d68335a862ab729ffae878b6f8a3cc774d97

      SHA256

      6812a48a86b7a9ca84cffe83f8678db2c495b09866fbe1a204f9bfe39854cd49

      SHA512

      e10d26b7d3156b9cda0d66cfbf31aaac7238e77d0fd0cd0c4e415f71867a0b3ca5254acbeda09109fb6f7bc2f92bb89682e52e7906af5ceb245db3c7a565e33c

    • C:\Users\Admin\AppData\Local\Temp\Derived

      Filesize

      30KB

      MD5

      f1548e92e0b2ffc07e003c7fae9ed9b9

      SHA1

      575ba8922ebbec527d150ec7c65992feace266db

      SHA256

      6b5b3edb8182fc38389ea991a97bc5bd798349e19aa9cacf413f415a3afbc0b5

      SHA512

      9f7dd7bedfe3ae8d4c8caebe241ca25a6f77d52c085b5aadc8ac5ea91ffdfe06c1c776854d2a953e11eed4437c1a851f6fa3388988e2220e57e23bbb7130b470

    • C:\Users\Admin\AppData\Local\Temp\Drunk

      Filesize

      109KB

      MD5

      e31afb9405514fd5b7ca3a02c5697de3

      SHA1

      d0c67c8ac6be3ba39586c2364a80d82ea07e9898

      SHA256

      d857088b8baa02a812fbeda516c74dc40907ddcd3e4d6a5be91b6c23042bd620

      SHA512

      0a6ba0aa91608b66fbc90857fd784a381619eb1781472b711f9c4123beec84e9ccbd269c062fd9071c1a0d5d5bbc694d700d562cba34076df6ed06b9ab146b88

    • C:\Users\Admin\AppData\Local\Temp\Fm

      Filesize

      478KB

      MD5

      d772c64b8f02e063f7f8b1cea9509574

      SHA1

      2aa72a8f3e6474e0d9d23cbf88b72cf60415a82b

      SHA256

      5c61934f8c63bd21694d648b69f70f426e8a462525c0ff6e4484464267961461

      SHA512

      6a497260969280d67c2ebbaddd24312e10fb4bfeecbc7f3f85d7ca6ca7c9afcbf1a2257f566a6cedf685abf9ec2c28ab7f643b173c52c6089578b7615d382c5c

    • C:\Users\Admin\AppData\Local\Temp\Glasses

      Filesize

      120KB

      MD5

      62ee0376f7b66f93856090027793c5ae

      SHA1

      358d6750df4765fea465451f1024892c132a8b5e

      SHA256

      312044d1badf072170a55deab7e126bcd766826ce201febc4a8dd74a7783f391

      SHA512

      74562de1769ffffdffc5518428bcdb5eadbd972f69ca37fa0971bf89f30ebaf41dacf2fe0b5373ffa0e1fe792f1bcb0aea0085ed0f94097cbfe5c23f3ee1edeb

    • C:\Users\Admin\AppData\Local\Temp\Hills

      Filesize

      31KB

      MD5

      56f234f3854b87f2da60d4370c80f4ef

      SHA1

      7196616a8c40ffd498de9fc18ef0b4182a410c5b

      SHA256

      e652ac7a40a3c797a190dc16d1741910d3785609289fef8379d488abec53ffc6

      SHA512

      a3ae351b9c35df7634ac622509a25bc2006f20b643c48efe521278ee6a1c40e69ee4c981bb9d53be783d203e3ddf87479846baeeaaabb026ed411ba3b7163176

    • C:\Users\Admin\AppData\Local\Temp\Pac

      Filesize

      87KB

      MD5

      44af3d9f2851fc9d3758542d4b83beb0

      SHA1

      00e5819a99f6bd7b8a91c56a20b4a04603ba1fdc

      SHA256

      6ec134b5a0eac1fac5216470cef1fd3a4d1a8d061d429030a9d12f7978aed5a9

      SHA512

      633b59dc281727cd5321b8135d0b5929bb0d37b7123913b777ddf2dbc7f5d3e71e4d7377750c97d4398596edb5b18f53d514356833613e5b0713bb0438a96e6f

    • C:\Users\Admin\AppData\Local\Temp\Plumbing

      Filesize

      62KB

      MD5

      d0a3f0692a9b5c96b6c1dfcb8192fdc6

      SHA1

      ca70a2d0ca34f6b06f4de3bd035e14183102a571

      SHA256

      bd20e251d01cf8ab324683f697faee6aa0dab7484609d5db9d5c98f84af49d72

      SHA512

      52290b8a0e714c0a5f03504e521c4e5511f53217985032db83a205b6b22baf18f5cfb23c353dc7aded90c43ff925ac8ef80b94bc086f7a8de4f93cbc13f94095

    • C:\Users\Admin\AppData\Local\Temp\Racing

      Filesize

      62KB

      MD5

      354d8dade537bd6b724e2c0385910994

      SHA1

      3fbfaf7a3806875311b74f8152d803a6385b6956

      SHA256

      ccb09907d574bb0f0e90db133039589205342f74d6410592841f1fb49b0b8678

      SHA512

      1a4869a55a65b2aa8f80e9284955ba66636da8dfbdb528d5b31b2ce469181403577708ed2c899c68c61ab9b9d33c140a8b8aa0c52ce94c375812a9e537527363

    • C:\Users\Admin\AppData\Local\Temp\Soundtrack

      Filesize

      78KB

      MD5

      43beeaedf4525e9ee2174012ee5ad60b

      SHA1

      67686a082061f90467fbd0536443175f5a2e77cc

      SHA256

      d672d30549406465eadc12703e91bf70014e81c60ef68d6b60f77b23c313e6b5

      SHA512

      9561e01bf0d52f2b32ccbff5c1bf74f97b414b6c89753c963d0302963534e3acbbc171670d0bd3d9fae0ea0b19de58cc04bda5b3864b7aff07dc3d1c85e4a5ac

    • C:\Users\Admin\AppData\Local\Temp\Tender

      Filesize

      70KB

      MD5

      6f2d9e28fc8288ba6a6858607da20564

      SHA1

      195eee4913f5a2d43ef717d7e4afed13f28c9ab9

      SHA256

      78e49500799a356e0ead812924ee64ba4a89031845df0c4b4d3a7c704d2ea84a

      SHA512

      fe930932d16863726ed3afd771d0a7d7ef0501ff5057325d0e7cb3466ded3783168736ef2b3c46774c7df09b441b82b455288b7eeb80c6ac39e0b64197d7cd95

    • C:\Users\Admin\AppData\Local\Temp\Totally

      Filesize

      50KB

      MD5

      c4af150b901a67bd95170ce3449b5c95

      SHA1

      95daab7704c8f186c963260596f274b0ae6f4fad

      SHA256

      53c65f7778006abe3ff0f8b696b80f22eea2f642313ef7c8b489aae884645852

      SHA512

      30078fdf0a5e69aa8df65f275ac26f75fb1ce548b231367cb7ef94cd1deddd3f5171dbe56f924c5c79c587f187f7563ffc482e6690b2e275bd823e231a66b42d

    • C:\Users\Admin\AppData\Local\Temp\Turner

      Filesize

      17KB

      MD5

      8302276f879565bfcf18de8278fa2df2

      SHA1

      5ade1c7516c3299b9a3572766a6512ef079f1aa1

      SHA256

      dd59aeaa649c3116f43228bf8da6614ae31d57e2da00777ab3b3e8dacd14258a

      SHA512

      515352faf704f9026bf22df113089d13ff0c9de6059efc28fef9d1371ca49618a55fa19c414a8493cf354e525b288bc342732d88aa3fe3143e3fea58107dbade

    • C:\Users\Admin\AppData\Local\Temp\York

      Filesize

      79KB

      MD5

      4bfd15f3a354c7a93533787429a3a645

      SHA1

      0a114c1d163c1417b97f21e21b48778b87fd9ad3

      SHA256

      31d5191e194b80b12101da35ab1a87a1d99db2ef2ee884855a02dedda29c5632

      SHA512

      333ac5f64e86f67a472bdcdcb69ce85fe670da874bc7f5c18398e390b5ecb767e945c3ab13e9ba7ad65ca4c7e367c3cdf99e52a478d3f9e1ac0f6bcd0decdca6

    • \Users\Admin\AppData\Local\Temp\764661\Macromedia.com

      Filesize

      925KB

      MD5

      62d09f076e6e0240548c2f837536a46a

      SHA1

      26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

      SHA256

      1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

      SHA512

      32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f