Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/01/2025, 20:11

General

  • Target

    1afa2560002b57a1e43485e23065260abd539ae721335e46c79ed59fee268c3f.exe

  • Size

    870KB

  • MD5

    57ec9c5cdef08280c7f86f1267b2048b

  • SHA1

    8d5a31a5fb1924525fbbf5d07ae69eb7452c748c

  • SHA256

    1afa2560002b57a1e43485e23065260abd539ae721335e46c79ed59fee268c3f

  • SHA512

    da60c8f0408ad9c7afdb56835819a94d7684a95a2c075b7716479fa3e2f33f6b1ee898b36f29667244a07370e002e6788a6d322e11b137c66792a8e365ba43b3

  • SSDEEP

    24576:dK6DnB9VOFzl/MAZVsz/5/8yT/r7w1P+1PHnZXmO3w3:0SB9VO7UAL65/zrr2+VnZXb3w3

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\1afa2560002b57a1e43485e23065260abd539ae721335e46c79ed59fee268c3f.exe
        "C:\Users\Admin\AppData\Local\Temp\1afa2560002b57a1e43485e23065260abd539ae721335e46c79ed59fee268c3f.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2120
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy Existing Existing.cmd & Existing.cmd
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2408
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2768
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "opssvc wrsa"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2052
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:1056
          • C:\Windows\SysWOW64\findstr.exe
            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1328
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 81942
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2908
          • C:\Windows\SysWOW64\extrac32.exe
            extrac32 /Y /E Logo
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1388
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "how" Hop
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1972
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b 81942\Jeremy.com + Prisoner + Customise + Indian + Worn + Symantec + Pas + Ira + Eddie + Thoroughly + Mu 81942\Jeremy.com
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2516
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Double + ..\Children + ..\Dietary V
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2032
          • C:\Users\Admin\AppData\Local\Temp\81942\Jeremy.com
            Jeremy.com V
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:348
            • C:\Users\Admin\AppData\Local\Temp\81942\RegAsm.exe
              C:\Users\Admin\AppData\Local\Temp\81942\RegAsm.exe
              5⤵
                PID:696
            • C:\Windows\SysWOW64\choice.exe
              choice /d y /t 5
              4⤵
              • System Location Discovery: System Language Discovery
              PID:1768
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c schtasks.exe /create /tn "Pride" /tr "wscript //B 'C:\Users\Admin\AppData\Local\DevSync Innovations Co\CodeSyncr.js'" /sc minute /mo 5 /F
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:916
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks.exe /create /tn "Pride" /tr "wscript //B 'C:\Users\Admin\AppData\Local\DevSync Innovations Co\CodeSyncr.js'" /sc minute /mo 5 /F
            3⤵
            • System Location Discovery: System Language Discovery
            • Scheduled Task/Job: Scheduled Task
            PID:576
        • C:\Windows\SysWOW64\cmd.exe
          cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CodeSyncr.url" & echo URL="C:\Users\Admin\AppData\Local\DevSync Innovations Co\CodeSyncr.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CodeSyncr.url" & exit
          2⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:1772

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\81942\Jeremy.com

        Filesize

        111B

        MD5

        2e9d9385e0913e5d7fbf417cb40d14c3

        SHA1

        2efc9b2756b94ff423ff29ad5fc18810f6bdfbed

        SHA256

        96db313120b75b37b7fd38437fc5ad0b92139c80d3e469e428267618b5c0291d

        SHA512

        8b60abac748d197cdec39af4b877e85e2e97243891d2aa3181d6bc02b99853cc7711d9c50c0ae4c3cf455413d1d5d67d217f57756fea38abb053253ff042cdc6

      • C:\Users\Admin\AppData\Local\Temp\81942\V

        Filesize

        238KB

        MD5

        dfe5845ed6d7525506bf283dd41eb31b

        SHA1

        d7057324e012758bf77ba5a99f6d7610e5f61b0a

        SHA256

        ebed6a39fa2dc6ab0d3c16ce2a6d32867f3f0bac6fc115c9658b0bf7734a15ca

        SHA512

        722fb362879c311fceb9d82a223a1634262a0c07e549273be8db98c6b74a55b41c442dcc075d36ae7570d935c2fd041f1cebd6c1a6546e46eb14172612b83377

      • C:\Users\Admin\AppData\Local\Temp\Children

        Filesize

        78KB

        MD5

        7a307b392147e3a42156c109dd6f95af

        SHA1

        2dc90391b452676fcb3dd6a1a93236c6ff437e65

        SHA256

        829fe470333b27f61e3b991ee4b9cc9c621d1a2d01e11243da0f9649b09b772b

        SHA512

        d83dec2c68e3ce152469df436b82415a2cdb8c31623ad5c77e347c7f7256cf43d7923643e85d59455e53bec9249e77cd001c25402f09065c491208fc1885e247

      • C:\Users\Admin\AppData\Local\Temp\Customise

        Filesize

        69KB

        MD5

        7fae28daa099e53b37901f7818b45607

        SHA1

        fdf9fe995feaafe87d8c19004252bfb96c315f21

        SHA256

        2cff24927925efa2e9dae6294389cbd050bd434866ec31145812a52bf9815ed8

        SHA512

        fcba3b494f06f7f8789374895ed39d70f70a03a9fdbe62c567d391c38c77cc6cfaf94b3d493a7d74b7b318c85d919b31589460bd1622a9feeee0cc0062075637

      • C:\Users\Admin\AppData\Local\Temp\Dietary

        Filesize

        85KB

        MD5

        e5edbfefd62649eea7c05505ba15f6b9

        SHA1

        5f7348d4111d6f72bc5fa88bffa2015123938d41

        SHA256

        68fb4ba4ed7405ec4dffaf8f52f1050a7047f37239dc7ebad33481d96a2be23a

        SHA512

        185d266577a783844831808ff5f7be4ff71a9570a9cbb83b8be88a773e31c4d6dcc79e9b1e862549305bcd716b26c96b797cbb04ed874edf22eb86cef6c0af81

      • C:\Users\Admin\AppData\Local\Temp\Double

        Filesize

        75KB

        MD5

        01fdb3cf0bc77e1b9c1f0820b312a6cf

        SHA1

        be37af2e26b7c377705f5c99267c00cd53a1028a

        SHA256

        8159623dce9af834d46935defd3142705edf02c537904506f3b32b1521e55c34

        SHA512

        bd5f098912decf43c3bdf3d733de605d12120973693d996e0a17d413a9fe8791107aba76c431d8da30685d5a85447c1f9a478924d24ea28d93dd4ac6c2bb1c5e

      • C:\Users\Admin\AppData\Local\Temp\Eddie

        Filesize

        148KB

        MD5

        0a49d4a762efe5ac132fc441d811f26b

        SHA1

        30827f27dfd79cef1170c409527c073b1fa1ca3d

        SHA256

        ec4e7fc59b7366c1c6ddd9f4148ea8fba5630ee4a69acd892875f0a6a41016ae

        SHA512

        5f27d64764fa7a040761883fd86dda54b4c5d0071f9ad5aa1ccd4b6d277ab95f35370e23704a74469cb3c28dd57a47d27484a2a8b56085608a6eebb25a686c2f

      • C:\Users\Admin\AppData\Local\Temp\Existing

        Filesize

        25KB

        MD5

        1254760a9e0011ae9d4db930db1233af

        SHA1

        fc9c44cfc3c425f3f72ada3906f8a1b4a938171b

        SHA256

        fe07bc52517a65c8e721d35bd75f2409b0efb72f4bbf7f6077acb533be31d142

        SHA512

        cd5304873f4f259e64f39e5db7ee7bc6610c9b13998e29fe3eb6cc9a0add0789ad9ba725a9f5fe412bf37d01e9b80cc1ae0a9bee6eec6bc24772603e213a08d7

      • C:\Users\Admin\AppData\Local\Temp\Hop

        Filesize

        114B

        MD5

        bd69145e6a38745badb691e5b6b6e7d8

        SHA1

        20b15d536763fc483a09ca29d4f9983806f7addc

        SHA256

        4bac509be21aef59924a5813e4690f9be39e166dc390073ccb6159e7e761cd41

        SHA512

        f7aafe44dea25123f7719aeb3b97cce7e21f1427388de689da68e22c329e13c69a24e9496b3109d24f3b5853e9f6f98c883f7d172447c0a428bbd8f4526f143f

      • C:\Users\Admin\AppData\Local\Temp\Indian

        Filesize

        76KB

        MD5

        90b6ec610093e9439636eb759a776f2b

        SHA1

        5c5bdb5f3baaaeb9b7f0b72dc9f784ea12a3ff06

        SHA256

        433ceb5887d17c144443365e1b87e84c7e82fe8741a7454b027511247839e20d

        SHA512

        e4ad2dcf887ced4ba8f78affcd9386c1df4e346a19c9c4643de3631454c766a68b2d7e6aa475c4e8aa4a88523d6b1f678774b385629330d924cf7b02c1307c03

      • C:\Users\Admin\AppData\Local\Temp\Ira

        Filesize

        101KB

        MD5

        c428807aac1fa5b7e72ef448a51bb9ca

        SHA1

        a81649dc37883cc7b364d5a0bb796cce8f15fbb4

        SHA256

        a1a536bd17e6fd1f18f9e523a615fc4be5045c062b2da46cccb2dcde2436da0d

        SHA512

        30e0cbc62addb9cceaecbef6a9f8c476a9f393f43931eb266b306bf8c4c816a7857b40ee3ddd0fb0338455b9df585bbe106d20b2eb4aae5c25cb0c6008769928

      • C:\Users\Admin\AppData\Local\Temp\Logo

        Filesize

        476KB

        MD5

        853c32094275e1921fd75242f3885884

        SHA1

        b44896f58c76523c53dbe4c7e17a330a1096ab1d

        SHA256

        9b65d3f6b396ac2ee0175f3a21783f9d9b1763b33cc6ecb45ef0c0812b38e734

        SHA512

        24b12d23526894aaf8c4663386245866ee3c26153ac7ee442a87a4a54ec6b653b5baf6a6df6d9ffd3da60796d58427242e300243c14c0f4f81e582389f672ea9

      • C:\Users\Admin\AppData\Local\Temp\Mu

        Filesize

        4KB

        MD5

        ab3c9032e275f877d42d7abe9cde9c36

        SHA1

        20c81e4fa28f0775780bd6d400ea8a399daa960b

        SHA256

        6c10606e3ed2e9b50b67b803e2ae2e04f35ab8ba2978eb1fcf1ac48c6987f23b

        SHA512

        83dcf00d265ca7aba4bb62359c4b373629bdb97ca240102ff96864376a8913c0b49206673a05a9e3e1fecd6c5495647fb03f69f884b505b601f78ca1dbe5447d

      • C:\Users\Admin\AppData\Local\Temp\Pas

        Filesize

        99KB

        MD5

        e4eb9f8786813fd069cacb3c43503b45

        SHA1

        83747e41c9f32fd05ed32aa508820099e5226650

        SHA256

        f8219fbcd4b874a914ef5683ca3170cb7c192f8e2f0602c617d0d093bd3d697c

        SHA512

        a3d6a0b5fa8eb58951d01af4a60c886acb130f55c35206cb1a32a1c0f7e55c35bc2a730a5f58f1d4a48218e14aed9a2a7ce5189480809b3ad09a042274de4357

      • C:\Users\Admin\AppData\Local\Temp\Prisoner

        Filesize

        114KB

        MD5

        ae42011c44754f7ecfcf2a25a28454fd

        SHA1

        4d87b3a238e52b47b75f93624d0e47fe354159e1

        SHA256

        8f58e84735af822b0cf3a47f1aff56065977dd1340cc12d9b80f8d9a78b36b9f

        SHA512

        86b46040332733e7307e9bae15267a175a78f0b0ac20046b59ca75b5427a0f877cc4949764fb59bf47135c686f217fd08cda22ab8b7cd37a1c4f8415064e49bf

      • C:\Users\Admin\AppData\Local\Temp\Symantec

        Filesize

        133KB

        MD5

        c8819f611876d274ddd72aa9e2f585b9

        SHA1

        1e8fb8708caa55159d8df65c4e70b438052348b6

        SHA256

        f832a3a3e99f68a9c527f77de08e3d93cd29da415086bf1ca8a86b9011951a84

        SHA512

        a56eb901dbf81af03a0b6afd8b42253e275c807558181c032ca9fad9a1309cedd2d8c1188650c9cd7af554ff6acda233dafaa6a6893b1457f008cc73d33199a6

      • C:\Users\Admin\AppData\Local\Temp\Thoroughly

        Filesize

        104KB

        MD5

        ddcb80e86dc49fcfea1c5a21772c0e8c

        SHA1

        aa93416a4e1440ebc2921e2418db26c1e400ce65

        SHA256

        4269d9dac69509ef730770f57f304672d37e7b69ba95fc3212f45dcfe6e0319d

        SHA512

        1550fd14bed83f35cf8f9c0bc33f7044caa967bdf7dbecbef754a7955853546adc6ebee903009957a2c4fac34762db3f58f00907f9f0cded0016eeb15b854ce3

      • C:\Users\Admin\AppData\Local\Temp\Worn

        Filesize

        76KB

        MD5

        53a24f3424a908f8a52df5e7517b42a5

        SHA1

        e5760828ba68dd8e1117d76dfe6cbaaa9660baca

        SHA256

        13212964b2b1d6a8d80e2a7d3e0469bf001e33808074400c0e23917610a03ac3

        SHA512

        2b8cacb2d8404834afb740a48396278e650475771b180335a101a1daaacc5661549018f697d00448046d11ed378b6aadfc6282a1e23cccc7e267bbe756a89b2c

      • \Users\Admin\AppData\Local\Temp\81942\Jeremy.com

        Filesize

        925KB

        MD5

        62d09f076e6e0240548c2f837536a46a

        SHA1

        26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

        SHA256

        1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

        SHA512

        32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

      • \Users\Admin\AppData\Local\Temp\81942\RegAsm.exe

        Filesize

        63KB

        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab