Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
23-06-2023 19:10
Behavioral task
behavioral1
Sample
35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe
Resource
win10v2004-20230621-en
General
-
Target
35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe
-
Size
2.2MB
-
MD5
4f9f6ae17f803c184847337451fa1ca9
-
SHA1
3b051fa1afa3d98d7abecab816d0bac9e51be0aa
-
SHA256
35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07
-
SHA512
b98d78494f82307f187fdfbccc875fc8ce4bf6bec1d678ad18f4aeae79dddd402690b5b2c2d5accf1393f018cbca7f264cbd3fd3bce4fc349b27145f6ec052ae
-
SSDEEP
49152:XeE2JNiuIdtb7mqxw1P3UbtibDk8eO1q+UTJHwnS891AeE7:XN4NiuwORUbtAeO1qP98j9H
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exepid process 1360 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exedescription pid process Token: SeDebugPrivilege 1360 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exepid process 1360 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe 1360 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe 1360 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe 1360 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe 1360 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe"C:\Users\Admin\AppData\Local\Temp\35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\God.dllFilesize
6KB
MD5d7a9b68b82f181f086db867c9cbf79a2
SHA18ab3bd43e1b5e2b9865be460b8ce7ed68311df05
SHA25638ac81b23cbd826f6a7ae115366565c00cabf3433bf1956dfc1154150f251cd0
SHA512f49ebdedb6329ebfd5120df7466a41164603750d4803de1a01f13c66e33d870d79ea92c8580eba821ea14c577aa9650b03ea321853b3ed9d281b39491e6b4cc7
-
memory/1360-54-0x00000000009D0000-0x0000000001032000-memory.dmpFilesize
6.4MB
-
memory/1360-55-0x00000000009D0000-0x0000000001032000-memory.dmpFilesize
6.4MB
-
memory/1360-57-0x00000000009D0000-0x0000000001032000-memory.dmpFilesize
6.4MB
-
memory/1360-56-0x00000000009D0000-0x0000000001032000-memory.dmpFilesize
6.4MB
-
memory/1360-63-0x0000000002750000-0x0000000002760000-memory.dmpFilesize
64KB
-
memory/1360-64-0x00000000009D0000-0x0000000001032000-memory.dmpFilesize
6.4MB
-
memory/1360-69-0x00000000009D0000-0x0000000001032000-memory.dmpFilesize
6.4MB
-
memory/1360-77-0x0000000002750000-0x0000000002760000-memory.dmpFilesize
64KB
-
memory/1360-80-0x00000000009D0000-0x0000000001032000-memory.dmpFilesize
6.4MB