Analysis
-
max time kernel
61s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2023 17:23
Static task
static1
Behavioral task
behavioral1
Sample
a1ce7b26712e1db177d86fa87d09c354.exe
Resource
win7-20230220-en
General
-
Target
a1ce7b26712e1db177d86fa87d09c354.exe
-
Size
827KB
-
MD5
a1ce7b26712e1db177d86fa87d09c354
-
SHA1
23d567e5ee4d4bf882f5d4ebe54643eecd921ef4
-
SHA256
b6b0ac3d7e4ef3a97fb470b38e53f3d8114b736b60408d9828cd5f81e2d7cf0e
-
SHA512
e5d5c4770131274c28dab0adbac3ed84395aca30a8c15f7004cd4d28ae503c507dacb432dcce65b2f004711837b3cd7a26766b028957aa3a8bc2d99f9dd849d4
-
SSDEEP
12288:IKY7z5GoJiGaq5auxKSjipNvJDK2WSqcIVr4vo1euUTyH2BQMyEp0mpefJ3Lww:G5GoR5amjipNvFK2LXG3VrEuqqJ8w
Malware Config
Extracted
gurcu
https://api.telegram.org/bot5948365373:AAHGoShKq2YoPLHuMrakRbVNthbMABFYHUc/sendMessage?chat_id=-1001620069625
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4144 set thread context of 4656 4144 a1ce7b26712e1db177d86fa87d09c354.exe 93 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4144 a1ce7b26712e1db177d86fa87d09c354.exe 4144 a1ce7b26712e1db177d86fa87d09c354.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4144 a1ce7b26712e1db177d86fa87d09c354.exe Token: SeDebugPrivilege 4656 a1ce7b26712e1db177d86fa87d09c354.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4144 wrote to memory of 2776 4144 a1ce7b26712e1db177d86fa87d09c354.exe 92 PID 4144 wrote to memory of 2776 4144 a1ce7b26712e1db177d86fa87d09c354.exe 92 PID 4144 wrote to memory of 2776 4144 a1ce7b26712e1db177d86fa87d09c354.exe 92 PID 4144 wrote to memory of 4656 4144 a1ce7b26712e1db177d86fa87d09c354.exe 93 PID 4144 wrote to memory of 4656 4144 a1ce7b26712e1db177d86fa87d09c354.exe 93 PID 4144 wrote to memory of 4656 4144 a1ce7b26712e1db177d86fa87d09c354.exe 93 PID 4144 wrote to memory of 4656 4144 a1ce7b26712e1db177d86fa87d09c354.exe 93 PID 4144 wrote to memory of 4656 4144 a1ce7b26712e1db177d86fa87d09c354.exe 93 PID 4144 wrote to memory of 4656 4144 a1ce7b26712e1db177d86fa87d09c354.exe 93 PID 4144 wrote to memory of 4656 4144 a1ce7b26712e1db177d86fa87d09c354.exe 93 PID 4144 wrote to memory of 4656 4144 a1ce7b26712e1db177d86fa87d09c354.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1ce7b26712e1db177d86fa87d09c354.exe"C:\Users\Admin\AppData\Local\Temp\a1ce7b26712e1db177d86fa87d09c354.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\a1ce7b26712e1db177d86fa87d09c354.exe"C:\Users\Admin\AppData\Local\Temp\a1ce7b26712e1db177d86fa87d09c354.exe"2⤵PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\a1ce7b26712e1db177d86fa87d09c354.exe"C:\Users\Admin\AppData\Local\Temp\a1ce7b26712e1db177d86fa87d09c354.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a1ce7b26712e1db177d86fa87d09c354.exe.log
Filesize1KB
MD57cad59aef5a93f093b6ba494f13f796f
SHA13cef97b77939bfc06dfd3946fc1a8cd159f67100
SHA2561e1b444fe2d8772f6709b22b94bb5b0aa7fa590f6a693705d9bf1f2f71267a55
SHA5128cedd03efec34c6226a01fd6b4831a689be16545ea6b849cd96f775e0722bfefd4b47f3dd8401d2080d341d4319f75995ece60de44352a1f86a2e5dc01e6210b