Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
29/08/2023, 07:50
Behavioral task
behavioral1
Sample
3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe
Resource
win10v2004-20230703-en
General
-
Target
3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe
-
Size
815KB
-
MD5
9bbeed0c0851670970d69e497967bf0b
-
SHA1
0a0963c8d19b2c35202c8debdc606d2ff5a3bc05
-
SHA256
3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a
-
SHA512
06feec071051161218caaa8c186f650cbcd6b2934d8910f13c749a022d53c6b7b02bca404fbc693d13eb02f659d938f1ad3b90bdc628457aa74e2d107eb518c6
-
SSDEEP
24576:fO1LHcsboAcntImlnm5bGFZ0XkAck+ffCUyCBZY3/x:G2Acn9CkZ0X2hff/yC3G/x
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 cmd.exe -
resource yara_rule behavioral1/memory/2088-0-0x0000000000E20000-0x0000000000F58000-memory.dmp upx behavioral1/memory/2088-34-0x0000000000E20000-0x0000000000F58000-memory.dmp upx behavioral1/memory/2088-36-0x0000000000E20000-0x0000000000F58000-memory.dmp upx -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\WindowsShell12287.log 3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe File opened for modification C:\Windows\WindowSystemNewUpdate215.log finger.exe File opened for modification C:\Windows\WindowTerminalVaild553.log finger.exe File opened for modification C:\Windows\WindowMicrosoftNET72.log finger.exe File opened for modification C:\Windows\WindowsShell3744638.log finger.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1656 2932 WerFault.exe 32 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe 1516 finger.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2088 3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe Token: SeDebugPrivilege 1516 finger.exe Token: SeIncBasePriorityPrivilege 2088 3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe Token: SeDebugPrivilege 1516 finger.exe Token: SeDebugPrivilege 1516 finger.exe Token: SeDebugPrivilege 1516 finger.exe Token: SeDebugPrivilege 1516 finger.exe Token: SeDebugPrivilege 1516 finger.exe Token: SeDebugPrivilege 1516 finger.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1516 2088 3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe 28 PID 2088 wrote to memory of 1516 2088 3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe 28 PID 2088 wrote to memory of 1516 2088 3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe 28 PID 2088 wrote to memory of 1516 2088 3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe 28 PID 2088 wrote to memory of 1516 2088 3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe 28 PID 2088 wrote to memory of 1516 2088 3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe 28 PID 2088 wrote to memory of 1516 2088 3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe 28 PID 2088 wrote to memory of 2744 2088 3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe 30 PID 2088 wrote to memory of 2744 2088 3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe 30 PID 2088 wrote to memory of 2744 2088 3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe 30 PID 2088 wrote to memory of 2744 2088 3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe 30 PID 1516 wrote to memory of 2932 1516 finger.exe 32 PID 1516 wrote to memory of 2932 1516 finger.exe 32 PID 1516 wrote to memory of 2932 1516 finger.exe 32 PID 1516 wrote to memory of 2932 1516 finger.exe 32 PID 1516 wrote to memory of 2932 1516 finger.exe 32 PID 1516 wrote to memory of 2932 1516 finger.exe 32 PID 1516 wrote to memory of 2932 1516 finger.exe 32 PID 2932 wrote to memory of 1656 2932 icardagt.exe 33 PID 2932 wrote to memory of 1656 2932 icardagt.exe 33 PID 2932 wrote to memory of 1656 2932 icardagt.exe 33 PID 2932 wrote to memory of 1656 2932 icardagt.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe"C:\Users\Admin\AppData\Local\Temp\3dba0f0493061ba1b6a4ba2d07b55573c332974f5af9a7a67dcc5dd2115d729a.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\finger.exe"C:\Windows\SysWOW64\finger.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\icardagt.exe"C:\Windows\SysWOW64\icardagt.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 2164⤵
- Program crash
PID:1656
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3DBA0F~1.EXE > nul2⤵
- Deletes itself
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD53afe83881d17fced67a88b8f88e17be8
SHA1532531f3696527c0490e941e006b6c065bc9eebc
SHA2569180c255271aad6211876216c1ff46b9f2a88fc9fa4c4a8b252910486fe898ff
SHA512c0e30e464dc543079e3b41e5690c2761aadec7a2315e59956b3ffa5bebe696adc3a94e4002e0ae9b8168a6c799fa84fddf7611d14c326c1189e59080d7ef4f11