Analysis
-
max time kernel
4s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
22-04-2021 07:09
Static task
static1
Behavioral task
behavioral1
Sample
698d49245a200364157220696c81de87.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
698d49245a200364157220696c81de87.exe
Resource
win10v20210408
General
-
Target
698d49245a200364157220696c81de87.exe
-
Size
413KB
-
MD5
698d49245a200364157220696c81de87
-
SHA1
75798c020a7e02d49b8140c29541242e2fbfd6f8
-
SHA256
048b796fb78b1a11d598189410f4de21f57094d283fbebaec36fc604b1f66197
-
SHA512
07c472955f92fc333e15213177e335c37c6b377e6515e7d2201c6a52fa14034b26ce37217b4768ae872bd230d83295a3add9d46e75de5f01f016339029a1d98a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
11299.exepid process 2020 11299.exe -
Deletes itself 1 IoCs
Processes:
11299.exepid process 2020 11299.exe -
Loads dropped DLL 2 IoCs
Processes:
698d49245a200364157220696c81de87.exepid process 788 698d49245a200364157220696c81de87.exe 788 698d49245a200364157220696c81de87.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
698d49245a200364157220696c81de87.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 698d49245a200364157220696c81de87.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\{0B448A1A-A7ED-4CA4-8FD3-496E22C778AD} = "C:\\ProgramData\\{7C068637-88A8-4D31-BDD6-3DD62F336A77}\\11299.exe" 698d49245a200364157220696c81de87.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
11299.exedescription pid process Token: SeDebugPrivilege 2020 11299.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
698d49245a200364157220696c81de87.exedescription pid process target process PID 788 wrote to memory of 2020 788 698d49245a200364157220696c81de87.exe 11299.exe PID 788 wrote to memory of 2020 788 698d49245a200364157220696c81de87.exe 11299.exe PID 788 wrote to memory of 2020 788 698d49245a200364157220696c81de87.exe 11299.exe PID 788 wrote to memory of 2020 788 698d49245a200364157220696c81de87.exe 11299.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\698d49245a200364157220696c81de87.exe"C:\Users\Admin\AppData\Local\Temp\698d49245a200364157220696c81de87.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\{7C068637-88A8-4D31-BDD6-3DD62F336A77}\11299.exe"C:\ProgramData\{7C068637-88A8-4D31-BDD6-3DD62F336A77}\11299.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\{7C068637-88A8-4D31-BDD6-3DD62F336A77}\11299.exeMD5
698d49245a200364157220696c81de87
SHA175798c020a7e02d49b8140c29541242e2fbfd6f8
SHA256048b796fb78b1a11d598189410f4de21f57094d283fbebaec36fc604b1f66197
SHA51207c472955f92fc333e15213177e335c37c6b377e6515e7d2201c6a52fa14034b26ce37217b4768ae872bd230d83295a3add9d46e75de5f01f016339029a1d98a
-
C:\Users\Admin\AppData\Local\Temp\B91F1F35505F49E79F553176MD5
c52991ad07c9816c8eb9f21ba7841773
SHA15adf69bfbd2e32a68df88d5a4b706293c01b8b6f
SHA256c8818e482dc424e12a6d0f0983decdf916640074d2718efa0ff07578d983c3ea
SHA5127fdc39ae42bb3f6023bb5010faca26abebc683ccfacfc930ee2b979d4a2b4bf5abdd0258af96a6f112a5fe324a278045197071298c0f3d135f147cac83e8a5a9
-
\ProgramData\{7C068637-88A8-4D31-BDD6-3DD62F336A77}\11299.exeMD5
698d49245a200364157220696c81de87
SHA175798c020a7e02d49b8140c29541242e2fbfd6f8
SHA256048b796fb78b1a11d598189410f4de21f57094d283fbebaec36fc604b1f66197
SHA51207c472955f92fc333e15213177e335c37c6b377e6515e7d2201c6a52fa14034b26ce37217b4768ae872bd230d83295a3add9d46e75de5f01f016339029a1d98a
-
\ProgramData\{7C068637-88A8-4D31-BDD6-3DD62F336A77}\11299.exeMD5
698d49245a200364157220696c81de87
SHA175798c020a7e02d49b8140c29541242e2fbfd6f8
SHA256048b796fb78b1a11d598189410f4de21f57094d283fbebaec36fc604b1f66197
SHA51207c472955f92fc333e15213177e335c37c6b377e6515e7d2201c6a52fa14034b26ce37217b4768ae872bd230d83295a3add9d46e75de5f01f016339029a1d98a
-
memory/788-59-0x0000000075A71000-0x0000000075A73000-memory.dmpFilesize
8KB
-
memory/788-64-0x00000000001B0000-0x00000000001FD000-memory.dmpFilesize
308KB
-
memory/788-65-0x0000000000400000-0x0000000000495000-memory.dmpFilesize
596KB
-
memory/2020-62-0x0000000000000000-mapping.dmp
-
memory/2020-69-0x0000000000400000-0x0000000000495000-memory.dmpFilesize
596KB