Analysis
-
max time kernel
53s -
max time network
87s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2023, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4.exe
Resource
win10v2004-20230703-en
General
-
Target
dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4.exe
-
Size
14.7MB
-
MD5
911da2ae0c3fd1644da45c8243a522ed
-
SHA1
63f128a4d43a8db068c455295fe0a98ebc1f85e0
-
SHA256
dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4
-
SHA512
00b13dd696384c469885f038178d01635ce3f920782204d492ce45b3db9cc77bf25bf7acd29ab04b5b40a3312f3af48860a41dfdd5f19e4e7c8b4012179a9910
-
SSDEEP
393216:ocZg26UtBwV4ZCuZxUVg5DZRGKGujoU5p3:E26oBweA4xUVgZMKlj
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x00070000000231af-7.dat aspack_v212_v242 behavioral2/files/0x00070000000231af-4.dat aspack_v212_v242 -
Loads dropped DLL 1 IoCs
pid Process 1284 dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1284 dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1284 dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4.exe 1284 dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1284 dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1284 dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4.exe 1284 dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4.exe 1284 dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4.exe 1284 dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4.exe"C:\Users\Admin\AppData\Local\Temp\dfaec40a2b1c69323ba20b6c91f7d2697080921fb2e698e7a8df1abb14b8b7d4.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1284
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD50eed4533257c57e70dfb96753e2d7afa
SHA1b876936f10597e2f1b15a0af35da644076030376
SHA25694fe80ee719e02e036902cc661b2ba07172de611afc3a2b8da45f1ec87bfde46
SHA51266644a6bb211a7e3999c5ffe5301ded2e5b5f29ef1be098d3d38719758fd4f3b49fdc76623381e3d14619bf66afba65ce36ad20e299a1f63b8cdd79eee306445
-
Filesize
53KB
MD50eed4533257c57e70dfb96753e2d7afa
SHA1b876936f10597e2f1b15a0af35da644076030376
SHA25694fe80ee719e02e036902cc661b2ba07172de611afc3a2b8da45f1ec87bfde46
SHA51266644a6bb211a7e3999c5ffe5301ded2e5b5f29ef1be098d3d38719758fd4f3b49fdc76623381e3d14619bf66afba65ce36ad20e299a1f63b8cdd79eee306445