Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-02-2025 03:50

General

  • Target

    AUTO SPARE PARTS LIST.exe

  • Size

    970KB

  • MD5

    ad4710de6439164971bcf0697dd25a55

  • SHA1

    ddbbf71511509b36fcafb71238e170769f590155

  • SHA256

    e9d87b999454486eb4f2d0befeb0ed7d82e59cc0cee03a646e0f5474a2610da6

  • SHA512

    00d84130a34046712f96590917b619e329806f8b8caf1e59beadd879c42a4a7fdf7e7eab335c7bfc14ff34a6719a252a8eb0a42a03e93982004b9941b9b5a5e8

  • SSDEEP

    12288:GYw1J/aQC2PqFOZzwWQ1vApLdckCDszpkU9e/pV8O/tCnfZs0aLEcsUV:i/8gJwKJdckCDSpkoehVvCfZUL7V

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AUTO SPARE PARTS LIST.exe
    "C:\Users\Admin\AppData\Local\Temp\AUTO SPARE PARTS LIST.exe"
    1⤵
    • Drops startup file
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3208
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c ping 127.0.0.1 -n 38 > nul && copy "C:\Users\Admin\AppData\Local\Temp\AUTO SPARE PARTS LIST.exe" "C:\Users\Admin\Desktop\AUTO SPARE PARTS LIST.exe" && ping 127.0.0.1 -n 38 > nul && "C:\Users\Admin\Desktop\AUTO SPARE PARTS LIST.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:5952
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 38
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:5760
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 38
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:1488
      • C:\Users\Admin\Desktop\AUTO SPARE PARTS LIST.exe
        "C:\Users\Admin\Desktop\AUTO SPARE PARTS LIST.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          4⤵
            PID:4328

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AUTO SPARE PARTS LIST.exe.log

      Filesize

      1KB

      MD5

      b5b0a1b2facedfcf3b5cf410369d8a78

      SHA1

      3e0703974b6abdf939dcfd81309b9d9ed65edb17

      SHA256

      1d8944aa85aa7d0a35e6596ecdec7bbb4974607e984a22d0a5d89f1bcdbb625d

      SHA512

      aea990f8e277e78c8f13ac6bc4270ef42be831b7d3f304e844fdf30eac0ce04d394650fd580c530985112c3dba8670f825ff5b1b0ef8ac0db3e143a95999403a

    • C:\Users\Admin\Desktop\AUTO SPARE PARTS LIST.exe

      Filesize

      970KB

      MD5

      ad4710de6439164971bcf0697dd25a55

      SHA1

      ddbbf71511509b36fcafb71238e170769f590155

      SHA256

      e9d87b999454486eb4f2d0befeb0ed7d82e59cc0cee03a646e0f5474a2610da6

      SHA512

      00d84130a34046712f96590917b619e329806f8b8caf1e59beadd879c42a4a7fdf7e7eab335c7bfc14ff34a6719a252a8eb0a42a03e93982004b9941b9b5a5e8

    • memory/2620-25-0x0000000009610000-0x0000000009616000-memory.dmp

      Filesize

      24KB

    • memory/2620-24-0x0000000006FC0000-0x0000000006FDA000-memory.dmp

      Filesize

      104KB

    • memory/2620-23-0x0000000074720000-0x0000000074ED0000-memory.dmp

      Filesize

      7.7MB

    • memory/2620-22-0x0000000074720000-0x0000000074ED0000-memory.dmp

      Filesize

      7.7MB

    • memory/2620-21-0x0000000074720000-0x0000000074ED0000-memory.dmp

      Filesize

      7.7MB

    • memory/2620-20-0x0000000074720000-0x0000000074ED0000-memory.dmp

      Filesize

      7.7MB

    • memory/3208-5-0x0000000004FE0000-0x0000000005072000-memory.dmp

      Filesize

      584KB

    • memory/3208-10-0x000000007475E000-0x000000007475F000-memory.dmp

      Filesize

      4KB

    • memory/3208-11-0x0000000074750000-0x0000000074F00000-memory.dmp

      Filesize

      7.7MB

    • memory/3208-13-0x0000000074750000-0x0000000074F00000-memory.dmp

      Filesize

      7.7MB

    • memory/3208-9-0x0000000074750000-0x0000000074F00000-memory.dmp

      Filesize

      7.7MB

    • memory/3208-7-0x00000000050C0000-0x00000000050CA000-memory.dmp

      Filesize

      40KB

    • memory/3208-6-0x0000000074750000-0x0000000074F00000-memory.dmp

      Filesize

      7.7MB

    • memory/3208-0-0x000000007475E000-0x000000007475F000-memory.dmp

      Filesize

      4KB

    • memory/3208-4-0x00000000056C0000-0x0000000005C64000-memory.dmp

      Filesize

      5.6MB

    • memory/3208-3-0x0000000002850000-0x0000000002876000-memory.dmp

      Filesize

      152KB

    • memory/3208-2-0x0000000004EA0000-0x0000000004F3C000-memory.dmp

      Filesize

      624KB

    • memory/3208-1-0x0000000000410000-0x0000000000506000-memory.dmp

      Filesize

      984KB