Analysis
-
max time kernel
139s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 10:39
Static task
static1
Behavioral task
behavioral1
Sample
195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe
Resource
win10v2004-20220812-en
General
-
Target
195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe
-
Size
680KB
-
MD5
293e93dc7cd681edd2e7807c7a3f2aec
-
SHA1
f11280c14e439d236b0b4fb2ddfc03d3cb49aff4
-
SHA256
195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63
-
SHA512
5b4806e414ba8717a08fb0efc47526fbe6b4165a93edd7cc5fa480463f6b1ac654165bf35707f48d2be49ecf30811d06e3e0c7eb97a8d08c3a9d7d2d572aa6dc
-
SSDEEP
12288:5tuuuuuuK0Jnn/b5TgIQHUbHdZPxa7JsymDm3rDG+Ll8/g:5XJneIFfob3rDGIl
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\bassmod.dll 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: 33 1932 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1932 AUDIODG.EXE Token: 33 1932 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1932 AUDIODG.EXE Token: SeDebugPrivilege 1464 195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe"C:\Users\Admin\AppData\Local\Temp\195cd3ff869bd25e857e5815cd26a3523fc4d9f70841e27726a5ff0c97d6ca63.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5641⤵
- Suspicious use of AdjustPrivilegeToken
PID:1932
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5df8dc26a027784a75dde0d64b46ac5ab
SHA1eb925aa1a84321fc2e805ecc347e350b64db0a71
SHA25682309fbfde20354cbd0159ae00d89b3c4bcfbe4324166d5210b815aa0ba77ca9
SHA512218933716d04f9ca7abaab9895fbc3acdb3dd232d1717da7ac5e6b232e18bbe5a65a41c2e1129b04d260dbb2f9dc101420aadbf12cbadfd1bf2ead2773f4e482