Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 01:43
Behavioral task
behavioral1
Sample
e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe
Resource
win10v2004-20220901-en
General
-
Target
e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe
-
Size
27KB
-
MD5
4a9a741d64dc6011d4a00e182c16a935
-
SHA1
7259659b5cb4cb207bd6104fd08bcf5a5f569a75
-
SHA256
e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c
-
SHA512
97112090f56d09a9fec5337fc4e12e8d62573ccdb3a4dd43faa3b12e373ab5511f06e5d65e29c03e50425871e45704820a85053db8404a0e3a0b66e7634b4e5a
-
SSDEEP
384:7XvGY+rTTGyTBOu2Bg5Xt0ArZZLOHFfTdAnOg7qveQJ4+twCuu+nNYJLPGBq:7fGvv9QuRyAr7mFfp6CWQJz+n4Lgq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1272 ~e56b967.tmp -
resource yara_rule behavioral2/memory/2128-132-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/2128-133-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe 1272 ~e56b967.tmp 1272 ~e56b967.tmp 1272 ~e56b967.tmp 1272 ~e56b967.tmp 1272 ~e56b967.tmp 1272 ~e56b967.tmp -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe Token: SeDebugPrivilege 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2128 wrote to memory of 1272 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe 89 PID 2128 wrote to memory of 1272 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe 89 PID 2128 wrote to memory of 1272 2128 e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe"C:\Users\Admin\AppData\Local\Temp\e9d9f569c3db831b88fe66894939928eebf89cf9080ab341bba68e8d09410c9c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\~e56b967.tmpC:\Users\Admin\AppData\Local\Temp\~e56b967.tmp2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1272
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5bf570d55a8a787fd36668c087ef9bc2b
SHA1fc0f2d5a31c99e981be903aac75a71e19b7bc1fa
SHA2569b20fe9d403a524296e1c47870a2d77ec322b601f5ef42645bf514bf0c4bfe73
SHA512b8bc2ec85c11a7d225ff4723e608e5ea27e0b7431cd2834c875b3c8160a0798b35306f7d9a32c1fca32eaeaffa57c7ba9e8a1158298962503b7778b35203db68
-
Filesize
6KB
MD5bf570d55a8a787fd36668c087ef9bc2b
SHA1fc0f2d5a31c99e981be903aac75a71e19b7bc1fa
SHA2569b20fe9d403a524296e1c47870a2d77ec322b601f5ef42645bf514bf0c4bfe73
SHA512b8bc2ec85c11a7d225ff4723e608e5ea27e0b7431cd2834c875b3c8160a0798b35306f7d9a32c1fca32eaeaffa57c7ba9e8a1158298962503b7778b35203db68