Analysis
-
max time kernel
76s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
05-03-2021 02:17
Static task
static1
Behavioral task
behavioral1
Sample
gen.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
gen.exe
Resource
win10v20201028
Errors
General
-
Target
gen.exe
-
Size
7.1MB
-
MD5
ac5874a4074d3f6daf8717e16476e355
-
SHA1
52fa45d972da9a90d725839654b1b6d05e13bf5f
-
SHA256
519a5e542e845e29039e769973ed337c6b5253dcd31e92cf63df7a22e916ee5d
-
SHA512
b62c53e2efb8db4ffed44983e68ed0a2c47be65ee31b814f6d74e6b636335ad170151bf49849dcd5544c435a2385c8e44d1c1287b4f424c0f7d99fd190969e5d
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
gen.exepid process 1952 gen.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 860 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 860 AUDIODG.EXE Token: 33 860 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 860 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
gen.exedescription pid process target process PID 1616 wrote to memory of 1952 1616 gen.exe gen.exe PID 1616 wrote to memory of 1952 1616 gen.exe gen.exe PID 1616 wrote to memory of 1952 1616 gen.exe gen.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\gen.exe"C:\Users\Admin\AppData\Local\Temp\gen.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\gen.exe"C:\Users\Admin\AppData\Local\Temp\gen.exe"2⤵
- Loads dropped DLL
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5981⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI16162\python39.dllMD5
088904a7f5b53107db42e15827e3af98
SHA11768e7fb1685410e188f663f5b259710f597e543
SHA2563761c232e151e9ceaf6c7d37b68da3df1962e3106e425cc3937d1f60170f3718
SHA512c5edc25fd9a37673f769af1a1fd540b41e68351bc30b44bc83a1d0d4a8fb078888bbb31173a77ef47698631c9816bc05637b499c20d63e3d65457d9aa4bc2c6b
-
\Users\Admin\AppData\Local\Temp\_MEI16162\python39.dllMD5
088904a7f5b53107db42e15827e3af98
SHA11768e7fb1685410e188f663f5b259710f597e543
SHA2563761c232e151e9ceaf6c7d37b68da3df1962e3106e425cc3937d1f60170f3718
SHA512c5edc25fd9a37673f769af1a1fd540b41e68351bc30b44bc83a1d0d4a8fb078888bbb31173a77ef47698631c9816bc05637b499c20d63e3d65457d9aa4bc2c6b
-
memory/888-8-0x00000000028F0000-0x00000000028F1000-memory.dmpFilesize
4KB
-
memory/1352-5-0x000007FEFC251000-0x000007FEFC253000-memory.dmpFilesize
8KB
-
memory/1352-6-0x0000000002840000-0x0000000002841000-memory.dmpFilesize
4KB
-
memory/1952-2-0x0000000000000000-mapping.dmp