Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 20:49

General

  • Target

    $1/1337/Ex.exe

  • Size

    3.1MB

  • MD5

    7afcb8667f1ec33f0cc084936a8a4044

  • SHA1

    a2755123f3515fbfcbd5b1ab38c22fa757b8afa8

  • SHA256

    2304cf3b3d0753318d60c2769c535a164d5f56ee0343c59ac616036d95e8ad71

  • SHA512

    bc04b81c01df03b360c225709d2db3078d1fb45fc2a67713f5f5154d050c71e241c2c7590f510d9f7ac3a0a4bc820b3b171d96cb56d23c0496df184e527162b8

  • SSDEEP

    98304:A5aFQWMH0wPoBn1ZPBIjKNMxCSz4Rg4MuykNt:A5aF1MHropPDuhg3z

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$1\1337\Ex.exe
    "C:\Users\Admin\AppData\Local\Temp\$1\1337\Ex.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo pUVyOKPt
      2⤵
        PID:2216
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c mkdir C:\Users\Admin\AppData\Roaming\Sysfiles & cmd < XuGJAWtEjFqgoZUl.com
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2572
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 moLu.nnnbID
            4⤵
            • Runs ping.exe
            PID:2536
          • C:\Windows\SysWOW64\certutil.exe
            certutil -decode qTh.com y
            4⤵
              PID:2632
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
              csrss.com y
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2404
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
                C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com y
                5⤵
                • Drops startup file
                • Executes dropped EXE
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:2432
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  6⤵
                    PID:2428
              • C:\Windows\SysWOW64\PING.EXE
                ping 127.0.0.1 -n 30
                4⤵
                • Runs ping.exe
                PID:2644

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Discovery

        System Information Discovery

        1
        T1082

        Remote System Discovery

        1
        T1018

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\EWSiFeMZzkUETFRYRVL.com
          Filesize

          921KB

          MD5

          c317736793ef5129f12a3568cd679422

          SHA1

          e68b55969c5f2159c847a629fac3731c0c315d53

          SHA256

          cbb5d906c63cbcb891b35e53156b643ac26c5dec922f43b2fd121ccca60beb62

          SHA512

          69cb5fd5f1a30c3c786ca945b8de6a460d03605fc3416a3c33e69691603e1a43ad0cfefe9cd5d6af1a154b701ecf34526cc05d9235a4e38acf994eb0edb1a82c

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\XuGJAWtEjFqgoZUl.com
          Filesize

          398B

          MD5

          0047726ce0f38e02fda2068d7ff7ceff

          SHA1

          0702fd3e290b95b70b5fc3b70cdb57c808baceb7

          SHA256

          0423e080422306752ccf52e4639a8f6e58596176e730d10bd812012ccf4f296b

          SHA512

          00b525c341b3297e3b011065b32bab9d29eee920e7faebea93e4fcc4fef69b166c11c10291cc9ba9b931551eca3dc9ddae27b681c4d4423478ea3a65d29c7d83

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\ZcaqngYeMJ.com
          Filesize

          2.3MB

          MD5

          09cc8b02108c2ca6db6197e37b165a65

          SHA1

          9f245c5206ce171cfc288ed8bf05896d1b36a1f0

          SHA256

          89ad1822d2ee2d5e39d2e4aae2016562244f7ea43071c192e8989a3c2544d998

          SHA512

          d50c20b554dd85996f8b7432fb3d3668c3fbfcd77314a4adc476861373a0350b122be61ab1aa087153e45c48cf6a453d0829ccfa4786cf679ee3dccb7cffadae

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\csrss.com
          Filesize

          921KB

          MD5

          8ed172328f643375ac09b31ffba0eb63

          SHA1

          c6716e5e5a311f597e37c5660b0387ab8f77b2a0

          SHA256

          23e87924005aeef08ab3c9402aa749c0373ed9fa6c1706c13ca1df5ec33f8928

          SHA512

          79efbac3cbf2bbbf1b5572a3036845fd544210a01adf9850d22587df12fd84832e14e8f7e0476955a8d9bb42ff0be5ca4443cee8e83dc396e70d850e31c60938

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\qTh.com
          Filesize

          1.1MB

          MD5

          13a508782d30a527e997a64996920287

          SHA1

          4628a103700d13b6f3920b3a8a06e9757bf0a9eb

          SHA256

          e06ad6278f8cdccb51ed58aee3d6ba97bd770b2d8b827746e539770fc959354e

          SHA512

          cd860c7c8eea0faf0e62f1e695f60c02050c284617265f3e9c11dac4e4cbea34cb656719ae6bdeb39a36dd1446bb443cbcf9c9f4a595c1749f9088d7c082d142

        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\y
          Filesize

          842KB

          MD5

          dbcc4336d132df084c59bbddff9693f5

          SHA1

          172d404379f6d288db4eacaa11bf0fa1ccffa451

          SHA256

          ea3b51ae7fb4264cd4aca28f02fa027bb25ce69a9ece5ff1f9f581b1ae62c84e

          SHA512

          d7209e47c9ef7e8f0db4bc736828e79d745415dde0dbaa7b4d5a21d6ee3406b139f3565cdcae16911c330d3ebbe1bcbe77f5e40d2313909a3b7b58697d3d4e34

        • memory/2428-27-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-28-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-29-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-83-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-81-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-33-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-82-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-55-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-54-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-51-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-49-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-47-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-45-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-43-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-41-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-35-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-104-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-98-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-96-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-92-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-88-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-85-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-79-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-75-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-72-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-68-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-65-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-32-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-62-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-59-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-57-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-56-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-31-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-53-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-52-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-50-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-106-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-48-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-46-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-44-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-42-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-40-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-39-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-38-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-37-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-36-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-103-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-101-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-99-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-34-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-95-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-93-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-91-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-89-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-86-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-78-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-76-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-73-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-71-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-69-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-66-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-63-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-60-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB

        • memory/2428-30-0x0000000000500000-0x0000000001500000-memory.dmp
          Filesize

          16.0MB