Analysis
-
max time kernel
140s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:41
Static task
static1
Behavioral task
behavioral1
Sample
dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exe
Resource
win10v2004-20221111-en
General
-
Target
dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exe
-
Size
93KB
-
MD5
43e07a83c129d2773466e666754c051a
-
SHA1
b230c002d023df16d4e997c1966474e104f0e318
-
SHA256
dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb
-
SHA512
7c291f987c91f48743d857db7f6f3abd37089626d8b0369846d5ee50b6927fee51bfeadadea08e5832773a6ae9915996b38c8c06736f93d6d76eaab91496d48e
-
SSDEEP
1536:+HxCaqYLXJOfEbvdTvqGORq0H/waHXxoqNFcMeYxoPR:+Hx8YL02HamwFDoP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
lsass.exepid process 940 lsass.exe -
Drops startup file 1 IoCs
Processes:
dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exe -
Loads dropped DLL 2 IoCs
Processes:
dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exepid process 2020 dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exe 2020 dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pid process 1404 1404 -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
lsass.exeexplorer.exepid process 940 lsass.exe 1296 explorer.exe 1404 1404 1404 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exelsass.exedescription pid process Token: SeDebugPrivilege 2020 dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exe Token: SeDebugPrivilege 940 lsass.exe Token: SeDebugPrivilege 1404 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 1404 1404 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1404 1404 -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exelsass.exedescription pid process target process PID 2020 wrote to memory of 940 2020 dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exe lsass.exe PID 2020 wrote to memory of 940 2020 dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exe lsass.exe PID 2020 wrote to memory of 940 2020 dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exe lsass.exe PID 2020 wrote to memory of 940 2020 dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exe lsass.exe PID 940 wrote to memory of 1296 940 lsass.exe explorer.exe PID 940 wrote to memory of 1296 940 lsass.exe explorer.exe PID 940 wrote to memory of 1296 940 lsass.exe explorer.exe PID 940 wrote to memory of 1296 940 lsass.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exe"C:\Users\Admin\AppData\Local\Temp\dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\explorer.exeC:\Windows\explorer.exe3⤵
- Suspicious behavior: MapViewOfSection
PID:1296
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD543e07a83c129d2773466e666754c051a
SHA1b230c002d023df16d4e997c1966474e104f0e318
SHA256dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb
SHA5127c291f987c91f48743d857db7f6f3abd37089626d8b0369846d5ee50b6927fee51bfeadadea08e5832773a6ae9915996b38c8c06736f93d6d76eaab91496d48e
-
Filesize
93KB
MD543e07a83c129d2773466e666754c051a
SHA1b230c002d023df16d4e997c1966474e104f0e318
SHA256dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb
SHA5127c291f987c91f48743d857db7f6f3abd37089626d8b0369846d5ee50b6927fee51bfeadadea08e5832773a6ae9915996b38c8c06736f93d6d76eaab91496d48e
-
Filesize
93KB
MD543e07a83c129d2773466e666754c051a
SHA1b230c002d023df16d4e997c1966474e104f0e318
SHA256dfe8a3f9071b4ffa3f974f1e0e0312de09fa52f593bafea3d02dab73d404eacb
SHA5127c291f987c91f48743d857db7f6f3abd37089626d8b0369846d5ee50b6927fee51bfeadadea08e5832773a6ae9915996b38c8c06736f93d6d76eaab91496d48e