Analysis
-
max time kernel
151s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe
Resource
win7-20220812-en
General
-
Target
3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe
-
Size
712KB
-
MD5
60535d269d5a2844a0eddfb8f7cb2390
-
SHA1
dccccfea4db8bc05fa841e0318f02b592c343e9f
-
SHA256
3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4
-
SHA512
c983fdb3f1f545699e250ea2fd8e92c51356a5574d26d8d8f7bf7037fb4dbe6f639cf3d1c4194661f3498a7f960f4a2917ef4aefa2bdad63c27ca939b8e75604
-
SSDEEP
12288:Rh1Lk70TnvjcTzqplcGds7hqiLBNicoN3cSuIy3goj4lcQlR7pWEjTSjogqNyy:Nk70TrcXqfcEs93L5OC2ocTNp9y9y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1948 Windows.exe -
resource yara_rule behavioral1/memory/1948-57-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/1948-60-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/1948-62-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/1948-63-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/1948-64-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral1/memory/1948-66-0x0000000000400000-0x00000000004B9000-memory.dmp upx -
Loads dropped DLL 1 IoCs
pid Process 1612 3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1612 set thread context of 1948 1612 3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe 26 -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1612 3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe Token: SeIncreaseQuotaPrivilege 1948 Windows.exe Token: SeSecurityPrivilege 1948 Windows.exe Token: SeTakeOwnershipPrivilege 1948 Windows.exe Token: SeLoadDriverPrivilege 1948 Windows.exe Token: SeSystemProfilePrivilege 1948 Windows.exe Token: SeSystemtimePrivilege 1948 Windows.exe Token: SeProfSingleProcessPrivilege 1948 Windows.exe Token: SeIncBasePriorityPrivilege 1948 Windows.exe Token: SeCreatePagefilePrivilege 1948 Windows.exe Token: SeBackupPrivilege 1948 Windows.exe Token: SeRestorePrivilege 1948 Windows.exe Token: SeShutdownPrivilege 1948 Windows.exe Token: SeDebugPrivilege 1948 Windows.exe Token: SeSystemEnvironmentPrivilege 1948 Windows.exe Token: SeChangeNotifyPrivilege 1948 Windows.exe Token: SeRemoteShutdownPrivilege 1948 Windows.exe Token: SeUndockPrivilege 1948 Windows.exe Token: SeManageVolumePrivilege 1948 Windows.exe Token: SeImpersonatePrivilege 1948 Windows.exe Token: SeCreateGlobalPrivilege 1948 Windows.exe Token: 33 1948 Windows.exe Token: 34 1948 Windows.exe Token: 35 1948 Windows.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1948 1612 3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe 26 PID 1612 wrote to memory of 1948 1612 3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe 26 PID 1612 wrote to memory of 1948 1612 3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe 26 PID 1612 wrote to memory of 1948 1612 3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe 26 PID 1612 wrote to memory of 1948 1612 3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe 26 PID 1612 wrote to memory of 1948 1612 3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe 26 PID 1612 wrote to memory of 1948 1612 3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe 26 PID 1612 wrote to memory of 1948 1612 3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe 26 PID 1612 wrote to memory of 1948 1612 3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe"C:\Users\Admin\AppData\Local\Temp\3cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Windows.exeC:\Users\Admin\AppData\Local\Temp\Windows.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD560535d269d5a2844a0eddfb8f7cb2390
SHA1dccccfea4db8bc05fa841e0318f02b592c343e9f
SHA2563cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4
SHA512c983fdb3f1f545699e250ea2fd8e92c51356a5574d26d8d8f7bf7037fb4dbe6f639cf3d1c4194661f3498a7f960f4a2917ef4aefa2bdad63c27ca939b8e75604
-
Filesize
712KB
MD560535d269d5a2844a0eddfb8f7cb2390
SHA1dccccfea4db8bc05fa841e0318f02b592c343e9f
SHA2563cccf9866e3cc9482de110f9b899234c57e87ddd831fdf9f8347019a10cebdb4
SHA512c983fdb3f1f545699e250ea2fd8e92c51356a5574d26d8d8f7bf7037fb4dbe6f639cf3d1c4194661f3498a7f960f4a2917ef4aefa2bdad63c27ca939b8e75604