Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:11

General

  • Target

    55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe

  • Size

    3.6MB

  • MD5

    3253b2e17495ad4fa33b0caa88defd97

  • SHA1

    112eeaa584434e26a2303b9ed654b2d9feabab20

  • SHA256

    55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d

  • SHA512

    e15a08a9a16817699526111907e9b3d9ed437c3d2da7b4a83a54f395cb71403cc6805b415494aa0bd2eb753ce53021ef77e4a1153865339572bd0841aadb1d77

  • SSDEEP

    98304:i250LpLG9AVCX9Uv1k24W2xhg+rjTCYSGtS+T7OvTik:i250PVCNUdF4zxhg+HSGQ+3kT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe
    "C:\Users\Admin\AppData\Local\Temp\55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\v1niYjz78P.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2776
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:2784
          • C:\Users\Default User\wininit.exe
            "C:\Users\Default User\wininit.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2248
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xDZppRkgYb.bat"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1408
              • C:\Windows\system32\chcp.com
                chcp 65001
                5⤵
                  PID:2204
                • C:\Windows\system32\w32tm.exe
                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                  5⤵
                    PID:2996
                  • C:\Users\Default User\wininit.exe
                    "C:\Users\Default User\wininit.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2944
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\abWCzBUFCD.bat"
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2080
                      • C:\Windows\system32\chcp.com
                        chcp 65001
                        7⤵
                          PID:1848
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          7⤵
                            PID:1660
                          • C:\Users\Default User\wininit.exe
                            "C:\Users\Default User\wininit.exe"
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:1796
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tgniDsG2Ey.bat"
                              8⤵
                              • Suspicious use of WriteProcessMemory
                              PID:2084
                              • C:\Windows\system32\chcp.com
                                chcp 65001
                                9⤵
                                  PID:2196
                                • C:\Windows\system32\PING.EXE
                                  ping -n 10 localhost
                                  9⤵
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  • Runs ping.exe
                                  PID:1736
                                • C:\Users\Default User\wininit.exe
                                  "C:\Users\Default User\wininit.exe"
                                  9⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:2812
                                  • C:\Windows\System32\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Auc8oj9cAR.bat"
                                    10⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:2956
                                    • C:\Windows\system32\chcp.com
                                      chcp 65001
                                      11⤵
                                        PID:1304
                                      • C:\Windows\system32\w32tm.exe
                                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                        11⤵
                                          PID:2920
                                        • C:\Users\Default User\wininit.exe
                                          "C:\Users\Default User\wininit.exe"
                                          11⤵
                                          • Executes dropped EXE
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2368

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\Auc8oj9cAR.bat

                      Filesize

                      209B

                      MD5

                      cd595fe2fa4a4b9b6aef6fce66dd9093

                      SHA1

                      d15cf07ad76df139bfee94e793da8221feb2c8ef

                      SHA256

                      f3b632b407a261690f6a649e011d3d80a621bae463f4468784e909face559275

                      SHA512

                      8ddfc515727968720bcfe4142b03c5df8e88879e031e1788f4dbfbec41fee461871d7ea567cb289d0650e1959ab169b2a7c110e4005c386b2e047ab2df2bbb70

                    • C:\Users\Admin\AppData\Local\Temp\abWCzBUFCD.bat

                      Filesize

                      209B

                      MD5

                      5f9b3f3dcb7646425bc0441266bf3788

                      SHA1

                      2e229ceea4be96c08fc5788fae215fa92cef2d7d

                      SHA256

                      db63abf71e9120f2dc33f2c22f80917cc5abe0bddd5a2b839a3894a9a339e72e

                      SHA512

                      359a5e3fdc78f4090e88281b95097ef5cae55dfdd62d2aea0da864d8cc176130aa5802c53cfea1898ee1406c7f0e92ef8fbd73916327026fea3b837be8173a0b

                    • C:\Users\Admin\AppData\Local\Temp\tgniDsG2Ey.bat

                      Filesize

                      161B

                      MD5

                      bb23385b8c89d91bc72f6e5b6a57a9a5

                      SHA1

                      a10297c6ea9cc2f67a2d9f4f8928d90289a619e8

                      SHA256

                      0088ae1d6baa91e9a60f28b96a37bd6e35b83584c02d0926b1ded570f85d9eb9

                      SHA512

                      d68464fc8f775fda4e6823b1a81dc6560d0fa76694cf4e74193f9b1c0afa72db955254a61bf8fd779fd12bb5c6f196bbffb04c9598c45a43eb235ed48969ca95

                    • C:\Users\Admin\AppData\Local\Temp\v1niYjz78P.bat

                      Filesize

                      209B

                      MD5

                      d1b5601b2999101af249a87dc05c4696

                      SHA1

                      f7c6c8011c45e5c5f7f9950abfceddc527da87f7

                      SHA256

                      fdf698e2bbd4ccaf81c4c30857021d30a38c6d26ec108fcc40a20e2aa466b8e7

                      SHA512

                      75fc4d1faa6580abd68a85b266079e84a714eb04441c64beb84356576e8c8e337e2667ce27c33bf69bdca770db450b4403aef7f2513b981d70de0c6e51a1d636

                    • C:\Users\Admin\AppData\Local\Temp\xDZppRkgYb.bat

                      Filesize

                      209B

                      MD5

                      d18e62af7c13eea6fe57d7463a159403

                      SHA1

                      25eda18fcb90d3658971a5b46ffc71cd50251dba

                      SHA256

                      15414e77943d694d1a8ed18a16c82db62c2044935d2ccd0872123ed1352ecef1

                      SHA512

                      2a5d8cd13701e55d6f849c91501458d898a0f7a9afe2740a9526b185695acd6528e4991675b08397feee66df7a8059cbdc2cc0cd079f1e37e305750c000c0b63

                    • C:\Users\Default\wininit.exe

                      Filesize

                      3.6MB

                      MD5

                      3253b2e17495ad4fa33b0caa88defd97

                      SHA1

                      112eeaa584434e26a2303b9ed654b2d9feabab20

                      SHA256

                      55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d

                      SHA512

                      e15a08a9a16817699526111907e9b3d9ed437c3d2da7b4a83a54f395cb71403cc6805b415494aa0bd2eb753ce53021ef77e4a1153865339572bd0841aadb1d77

                    • memory/1796-136-0x0000000000BF0000-0x0000000000F88000-memory.dmp

                      Filesize

                      3.6MB

                    • memory/1996-39-0x0000000000AD0000-0x0000000000ADE000-memory.dmp

                      Filesize

                      56KB

                    • memory/1996-44-0x0000000000BB0000-0x0000000000BC0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1996-14-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1996-16-0x0000000000470000-0x0000000000480000-memory.dmp

                      Filesize

                      64KB

                    • memory/1996-18-0x0000000000A70000-0x0000000000A88000-memory.dmp

                      Filesize

                      96KB

                    • memory/1996-20-0x0000000000480000-0x0000000000490000-memory.dmp

                      Filesize

                      64KB

                    • memory/1996-22-0x00000000004B0000-0x00000000004C0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1996-23-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1996-25-0x00000000004C0000-0x00000000004CE000-memory.dmp

                      Filesize

                      56KB

                    • memory/1996-27-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

                      Filesize

                      72KB

                    • memory/1996-29-0x0000000000A90000-0x0000000000A9C000-memory.dmp

                      Filesize

                      48KB

                    • memory/1996-32-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1996-31-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1996-34-0x0000000000AF0000-0x0000000000B06000-memory.dmp

                      Filesize

                      88KB

                    • memory/1996-37-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1996-36-0x0000000000B90000-0x0000000000BA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/1996-0-0x000007FEF5683000-0x000007FEF5684000-memory.dmp

                      Filesize

                      4KB

                    • memory/1996-40-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1996-42-0x0000000000AE0000-0x0000000000AF0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1996-13-0x0000000000490000-0x00000000004AC000-memory.dmp

                      Filesize

                      112KB

                    • memory/1996-45-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1996-47-0x000000001AA60000-0x000000001AABA000-memory.dmp

                      Filesize

                      360KB

                    • memory/1996-49-0x0000000000BC0000-0x0000000000BCE000-memory.dmp

                      Filesize

                      56KB

                    • memory/1996-51-0x0000000000BD0000-0x0000000000BE0000-memory.dmp

                      Filesize

                      64KB

                    • memory/1996-53-0x0000000000C60000-0x0000000000C6E000-memory.dmp

                      Filesize

                      56KB

                    • memory/1996-55-0x0000000000EB0000-0x0000000000EC8000-memory.dmp

                      Filesize

                      96KB

                    • memory/1996-57-0x000000001AAC0000-0x000000001AB0E000-memory.dmp

                      Filesize

                      312KB

                    • memory/1996-11-0x0000000000420000-0x000000000042C000-memory.dmp

                      Filesize

                      48KB

                    • memory/1996-73-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1996-9-0x0000000000410000-0x000000000041E000-memory.dmp

                      Filesize

                      56KB

                    • memory/1996-1-0x0000000000F40000-0x00000000012D8000-memory.dmp

                      Filesize

                      3.6MB

                    • memory/1996-7-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1996-2-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1996-6-0x0000000000430000-0x0000000000456000-memory.dmp

                      Filesize

                      152KB

                    • memory/1996-4-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/1996-3-0x000007FEF5680000-0x000007FEF606C000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/2248-76-0x0000000000900000-0x0000000000C98000-memory.dmp

                      Filesize

                      3.6MB

                    • memory/2368-197-0x00000000001B0000-0x0000000000548000-memory.dmp

                      Filesize

                      3.6MB

                    • memory/2812-166-0x0000000000010000-0x00000000003A8000-memory.dmp

                      Filesize

                      3.6MB

                    • memory/2944-106-0x0000000000990000-0x0000000000D28000-memory.dmp

                      Filesize

                      3.6MB