Analysis
-
max time kernel
127s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2023, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
1232exe.exe
Resource
win7-20230621-en
General
-
Target
1232exe.exe
-
Size
827KB
-
MD5
a1ce7b26712e1db177d86fa87d09c354
-
SHA1
23d567e5ee4d4bf882f5d4ebe54643eecd921ef4
-
SHA256
b6b0ac3d7e4ef3a97fb470b38e53f3d8114b736b60408d9828cd5f81e2d7cf0e
-
SHA512
e5d5c4770131274c28dab0adbac3ed84395aca30a8c15f7004cd4d28ae503c507dacb432dcce65b2f004711837b3cd7a26766b028957aa3a8bc2d99f9dd849d4
-
SSDEEP
12288:IKY7z5GoJiGaq5auxKSjipNvJDK2WSqcIVr4vo1euUTyH2BQMyEp0mpefJ3Lww:G5GoR5amjipNvFK2LXG3VrEuqqJ8w
Malware Config
Extracted
gurcu
https://api.telegram.org/bot5948365373:AAHGoShKq2YoPLHuMrakRbVNthbMABFYHUc/sendMessage?chat_id=-1001620069625
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3876 set thread context of 4380 3876 1232exe.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 2544 4380 WerFault.exe 90 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4380 1232exe.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3876 wrote to memory of 4380 3876 1232exe.exe 90 PID 3876 wrote to memory of 4380 3876 1232exe.exe 90 PID 3876 wrote to memory of 4380 3876 1232exe.exe 90 PID 3876 wrote to memory of 4380 3876 1232exe.exe 90 PID 3876 wrote to memory of 4380 3876 1232exe.exe 90 PID 3876 wrote to memory of 4380 3876 1232exe.exe 90 PID 3876 wrote to memory of 4380 3876 1232exe.exe 90 PID 3876 wrote to memory of 4380 3876 1232exe.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1232exe.exe"C:\Users\Admin\AppData\Local\Temp\1232exe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\1232exe.exe"C:\Users\Admin\AppData\Local\Temp\1232exe.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 17603⤵
- Program crash
PID:2544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4380 -ip 43801⤵PID:2692
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57cad59aef5a93f093b6ba494f13f796f
SHA13cef97b77939bfc06dfd3946fc1a8cd159f67100
SHA2561e1b444fe2d8772f6709b22b94bb5b0aa7fa590f6a693705d9bf1f2f71267a55
SHA5128cedd03efec34c6226a01fd6b4831a689be16545ea6b849cd96f775e0722bfefd4b47f3dd8401d2080d341d4319f75995ece60de44352a1f86a2e5dc01e6210b