Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2023, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe
Resource
win10v2004-20230915-en
General
-
Target
4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe
-
Size
3.6MB
-
MD5
3fdab81f490b160da817ea9bc4c27774
-
SHA1
d8c9b8dacabe38df6398a56f7a891ee07311264e
-
SHA256
4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092
-
SHA512
d55dd1f3a91aa423b89b108bea3cd0e45f23f9068223b6697416135ae2de6b76610267006261476a6563dd40480215efcbdb1715ec63d8a9ff9e20b6632dcee6
-
SSDEEP
49152:CzqmsTQdrdHMtj7DrDok7RB5SNb0IzoKSaYSoM85ZYiEXfKJf6Jfm9Hh:1fTQdrdWj7cARBu4IzTmIOtEyB6Bmdh
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2632-1-0x0000000010000000-0x0000000010034000-memory.dmp upx behavioral2/memory/2632-0-0x0000000010000000-0x0000000010034000-memory.dmp upx behavioral2/memory/2632-3-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-10-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-12-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-15-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-2-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-17-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-18-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-19-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-20-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-21-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-86-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-84-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-85-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-97-0x0000000010000000-0x0000000010034000-memory.dmp upx behavioral2/memory/2632-96-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-98-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-99-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-100-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-101-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-102-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-103-0x0000000002830000-0x0000000002DDB000-memory.dmp upx behavioral2/memory/2632-104-0x0000000002830000-0x0000000002DDB000-memory.dmp upx -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
description pid Process Token: 33 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: SeIncBasePriorityPrivilege 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: 33 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: SeIncBasePriorityPrivilege 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: 33 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: SeIncBasePriorityPrivilege 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: 33 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: SeIncBasePriorityPrivilege 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: 33 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: SeIncBasePriorityPrivilege 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: 33 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: SeIncBasePriorityPrivilege 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: 33 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: SeIncBasePriorityPrivilege 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: 33 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: SeIncBasePriorityPrivilege 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: 33 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: SeIncBasePriorityPrivilege 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: 33 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: SeIncBasePriorityPrivilege 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: 33 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: SeIncBasePriorityPrivilege 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: 33 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: SeIncBasePriorityPrivilege 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: 33 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: SeIncBasePriorityPrivilege 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: 33 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe Token: SeIncBasePriorityPrivilege 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe 2632 4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe"C:\Users\Admin\AppData\Local\Temp\4feeb6d02f0b5e8c2e82c6deec4a973943c61bec7a4c8d24ef8d3cac2b0c1092.exe"1⤵
- Enumerates connected drives
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\settings.sol
Filesize456B
MD51d4f868136a8e651dac2956694a97203
SHA1011dcd307e83abb2c891046117eac609f217f69c
SHA25675cfed043b967ba7018adec1ca1b8f5e296844c60c11989c19f2b3fb285a1f77
SHA51248211cabe6fa29f9c9a0476bb674190feee305265be9be09d97d03c1c278c3344a1623d5d5f29ad56eac993d1fd4290466ee71d37ac7076786af45f7e0882193