Analysis
-
max time kernel
182s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 17:12
Static task
static1
Behavioral task
behavioral1
Sample
efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe
Resource
win10v2004-20220812-en
General
-
Target
efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe
-
Size
860KB
-
MD5
dbde22b1a6fbc953fde0c33e0e3680b7
-
SHA1
3d5cfa8569991508e05465de85af8f0f97ab94dd
-
SHA256
efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d
-
SHA512
08811f563aee45ac1959e5a159dfd2d7efd065edc6345906207c698ceb669a111944f5910631cca0bf66fbd7f9a8e13dcf2342fa67f637fa99cdfc72903bebb2
-
SSDEEP
12288:I60a5r6BgBAOI4cha7upZ/5XiX2qc91a6mJntVTN4:qBgBAOI4cs7uf/5SX2HaBJntlN4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exepid process 1968 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exedescription pid process target process PID 4840 set thread context of 1968 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exepid process 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exedescription pid process Token: SeSecurityPrivilege 1968 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exepid process 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.execmd.exenet.exedescription pid process target process PID 4840 wrote to memory of 2204 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe cmd.exe PID 4840 wrote to memory of 2204 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe cmd.exe PID 4840 wrote to memory of 2204 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe cmd.exe PID 4840 wrote to memory of 1968 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe PID 4840 wrote to memory of 1968 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe PID 4840 wrote to memory of 1968 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe PID 4840 wrote to memory of 1968 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe PID 4840 wrote to memory of 1968 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe PID 4840 wrote to memory of 1968 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe PID 4840 wrote to memory of 1968 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe PID 4840 wrote to memory of 1968 4840 efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe PID 2204 wrote to memory of 3540 2204 cmd.exe net.exe PID 2204 wrote to memory of 3540 2204 cmd.exe net.exe PID 2204 wrote to memory of 3540 2204 cmd.exe net.exe PID 3540 wrote to memory of 4768 3540 net.exe net1.exe PID 3540 wrote to memory of 4768 3540 net.exe net1.exe PID 3540 wrote to memory of 4768 3540 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe"C:\Users\Admin\AppData\Local\Temp\efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exeC:\Users\Admin\AppData\Local\Temp\efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1968
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d.exe
Filesize860KB
MD5dbde22b1a6fbc953fde0c33e0e3680b7
SHA13d5cfa8569991508e05465de85af8f0f97ab94dd
SHA256efd326904e220f1affae001f2c5dc97feec11185f297deca17ceda8178220f4d
SHA51208811f563aee45ac1959e5a159dfd2d7efd065edc6345906207c698ceb669a111944f5910631cca0bf66fbd7f9a8e13dcf2342fa67f637fa99cdfc72903bebb2