Analysis
-
max time kernel
28s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01/09/2023, 05:43
Behavioral task
behavioral1
Sample
84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe
Resource
win10v2004-20230831-en
General
-
Target
84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe
-
Size
815KB
-
MD5
53edef7bcda0d2a8c218b1c98d963a1b
-
SHA1
892ccc4dbf22ca383bdcc597b0da66394856bb65
-
SHA256
84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca
-
SHA512
c417f5c660f9d679d1e8c1c2b27a91ef7360b8f6ae78be9ef4a17e0d2a8967b671bcad8f6f9f9e02ca775bd2d46e5c6783d16458c2265ea8541864ac104d6009
-
SSDEEP
24576:fO1LHcsboAcntImlnm5bGFZ0XkAck+ffCUyCBZY3/:G2Acn9CkZ0X2hff/yC3G/
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1288-0-0x0000000000120000-0x0000000000258000-memory.dmp upx behavioral1/memory/1288-16-0x0000000000120000-0x0000000000258000-memory.dmp upx behavioral1/memory/1288-25-0x0000000000120000-0x0000000000258000-memory.dmp upx behavioral1/memory/1288-45-0x0000000000120000-0x0000000000258000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\WindowsShell48708.log 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe File opened for modification C:\Windows\WindowSystemNewUpdate814.log 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2628 1120 WerFault.exe 28 2032 2536 WerFault.exe 30 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe Token: SeDebugPrivilege 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe Token: SeIncBasePriorityPrivilege 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1120 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 28 PID 1288 wrote to memory of 1120 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 28 PID 1288 wrote to memory of 1120 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 28 PID 1288 wrote to memory of 1120 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 28 PID 1288 wrote to memory of 1120 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 28 PID 1288 wrote to memory of 1120 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 28 PID 1288 wrote to memory of 1120 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 28 PID 1120 wrote to memory of 2628 1120 cliconfg.exe 29 PID 1120 wrote to memory of 2628 1120 cliconfg.exe 29 PID 1120 wrote to memory of 2628 1120 cliconfg.exe 29 PID 1120 wrote to memory of 2628 1120 cliconfg.exe 29 PID 1288 wrote to memory of 2536 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 30 PID 1288 wrote to memory of 2536 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 30 PID 1288 wrote to memory of 2536 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 30 PID 1288 wrote to memory of 2536 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 30 PID 1288 wrote to memory of 2536 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 30 PID 1288 wrote to memory of 2536 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 30 PID 1288 wrote to memory of 2536 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 30 PID 2536 wrote to memory of 2032 2536 OptionalFeatures.exe 31 PID 2536 wrote to memory of 2032 2536 OptionalFeatures.exe 31 PID 2536 wrote to memory of 2032 2536 OptionalFeatures.exe 31 PID 2536 wrote to memory of 2032 2536 OptionalFeatures.exe 31 PID 1288 wrote to memory of 2428 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 32 PID 1288 wrote to memory of 2428 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 32 PID 1288 wrote to memory of 2428 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 32 PID 1288 wrote to memory of 2428 1288 84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe"C:\Users\Admin\AppData\Local\Temp\84df3ba7db93d74885c9889c987b77e85734ef446079a58385350518d72920ca.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\cliconfg.exe"C:\Windows\SysWOW64\cliconfg.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 923⤵
- Program crash
PID:2628
-
-
-
C:\Windows\SysWOW64\OptionalFeatures.exe"C:\Windows\SysWOW64\OptionalFeatures.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 1883⤵
- Program crash
PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\84DF3B~1.EXE > nul2⤵PID:2428
-