Overview
overview
10Static
static
31.exe
windows7-x64
101.exe
windows10-2004-x64
102.exe
windows7-x64
102.exe
windows10-2004-x64
103.exe
windows7-x64
103.exe
windows10-2004-x64
104.exe
windows7-x64
104.exe
windows10-2004-x64
15.exe
windows7-x64
105.exe
windows10-2004-x64
106.exe
windows7-x64
106.exe
windows10-2004-x64
107.exe
windows7-x64
107.exe
windows10-2004-x64
108.exe
windows7-x64
108.exe
windows10-2004-x64
10Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2023 09:11
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral3
Sample
2.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
2.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral5
Sample
3.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
3.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral7
Sample
4.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
4.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral9
Sample
5.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
5.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral11
Sample
6.exe
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
6.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral13
Sample
7.exe
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
7.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral15
Sample
8.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
8.exe
Resource
win10v2004-20230831-en
General
-
Target
4.exe
-
Size
3.6MB
-
MD5
5f402b45d312bc4f55a64e12cf7ba2c9
-
SHA1
c78d625621195ea27216c79136b6b09a1896439d
-
SHA256
c99b88893104c1970f71c6086d2910072c2ed4eb09824a11dde4cf1f8f7aa1df
-
SHA512
1cdb012dff83624f8efd1b315c4cdd0ea51c2eb67858c930951f49e7758f20886359249b62c18b8b7bd43a4a3d0c76f85f4252059ea48915599c690d68571d5a
-
SSDEEP
49152:KA+kLL7LdMsste6ESz6cYHmyRtuGlsXbkKuLzsxtPZSbM820S:n30j6rmgtvlkysxRz
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 3768 svchost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
4.exedescription pid process target process PID 4744 wrote to memory of 2920 4744 4.exe curl.exe PID 4744 wrote to memory of 2920 4744 4.exe curl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\curl.execurl https://myip.ipip.net/2⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3768-0-0x0000015BCC740000-0x0000015BCC750000-memory.dmpFilesize
64KB
-
memory/3768-16-0x0000015BCC840000-0x0000015BCC850000-memory.dmpFilesize
64KB
-
memory/3768-32-0x0000015BD4E10000-0x0000015BD4E11000-memory.dmpFilesize
4KB
-
memory/3768-33-0x0000015BD4E40000-0x0000015BD4E41000-memory.dmpFilesize
4KB
-
memory/3768-34-0x0000015BD4E40000-0x0000015BD4E41000-memory.dmpFilesize
4KB
-
memory/3768-35-0x0000015BD4E40000-0x0000015BD4E41000-memory.dmpFilesize
4KB
-
memory/3768-36-0x0000015BD4E40000-0x0000015BD4E41000-memory.dmpFilesize
4KB
-
memory/3768-37-0x0000015BD4E40000-0x0000015BD4E41000-memory.dmpFilesize
4KB
-
memory/3768-38-0x0000015BD4E40000-0x0000015BD4E41000-memory.dmpFilesize
4KB
-
memory/3768-39-0x0000015BD4E40000-0x0000015BD4E41000-memory.dmpFilesize
4KB
-
memory/3768-40-0x0000015BD4E40000-0x0000015BD4E41000-memory.dmpFilesize
4KB
-
memory/3768-41-0x0000015BD4E40000-0x0000015BD4E41000-memory.dmpFilesize
4KB
-
memory/3768-42-0x0000015BD4E40000-0x0000015BD4E41000-memory.dmpFilesize
4KB
-
memory/3768-43-0x0000015BD4A60000-0x0000015BD4A61000-memory.dmpFilesize
4KB
-
memory/3768-44-0x0000015BD4A50000-0x0000015BD4A51000-memory.dmpFilesize
4KB
-
memory/3768-46-0x0000015BD4A60000-0x0000015BD4A61000-memory.dmpFilesize
4KB
-
memory/3768-49-0x0000015BD4A50000-0x0000015BD4A51000-memory.dmpFilesize
4KB
-
memory/3768-52-0x0000015BD4990000-0x0000015BD4991000-memory.dmpFilesize
4KB
-
memory/3768-64-0x0000015BD4B90000-0x0000015BD4B91000-memory.dmpFilesize
4KB
-
memory/3768-66-0x0000015BD4BA0000-0x0000015BD4BA1000-memory.dmpFilesize
4KB
-
memory/3768-67-0x0000015BD4BA0000-0x0000015BD4BA1000-memory.dmpFilesize
4KB
-
memory/3768-68-0x0000015BD4CB0000-0x0000015BD4CB1000-memory.dmpFilesize
4KB