Analysis
-
max time kernel
51s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe
Resource
win10v2004-20220812-en
General
-
Target
dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe
-
Size
129KB
-
MD5
a31f822068875eeae2d252c98bb40070
-
SHA1
0b74295acf4f778ce51e5cb1e0a8fccb93c5f8ad
-
SHA256
dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7
-
SHA512
8754c3732c4e5655796ecee8903cf01903d8d419f6b353490504c215f5faf659d8bfadb900657a3c23a319b5e5503634413e3f058869cd9399edfc07768b6111
-
SSDEEP
3072:mK3ieyq3IdtfCy5EQcpcUEjFxuI5h1p4QHpnH0gnFKAZ7:j3iTqktcCX1p4unlFbZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1396 auxynir.exe -
Deletes itself 1 IoCs
pid Process 1164 explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1600 set thread context of 1164 1600 dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe 28 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\auxynir.exe dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe File opened for modification C:\Windows\auxynir.exe dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1600 dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe 1600 dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe 1396 auxynir.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1600 dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1396 1600 dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe 27 PID 1600 wrote to memory of 1396 1600 dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe 27 PID 1600 wrote to memory of 1396 1600 dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe 27 PID 1600 wrote to memory of 1396 1600 dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe 27 PID 1600 wrote to memory of 1164 1600 dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe 28 PID 1600 wrote to memory of 1164 1600 dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe 28 PID 1600 wrote to memory of 1164 1600 dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe 28 PID 1600 wrote to memory of 1164 1600 dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe 28 PID 1600 wrote to memory of 1164 1600 dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe 28 PID 1396 wrote to memory of 1208 1396 auxynir.exe 16
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe"C:\Users\Admin\AppData\Local\Temp\dcefde87b830533f6b1721f77d07c11917995509ffde188eb63bd0a064aedfe7.exe"2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\auxynir.exeC:\Windows\auxynir.exe a3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1396
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Deletes itself
PID:1164
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD58ec586166f9beeb4f2310aa66e3c8142
SHA1d9274d2ff5040fc4d1d76a7f6df7798185e28ced
SHA256bee961002cc9abb81916a31e6a3a35c48d1207e30cccaed0e789b48be9f75e28
SHA512093623ac2db497a7e043667ae752a356b5f486340ad0930f0cfa3d3590f38a71a8da3dfccd7b3c2ba4cb15f35c59daa5810d700788da4b1588d9cf9d88e0036e