Analysis
-
max time kernel
84s -
max time network
82s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
199668462be2edab3dccf4fd318cc672.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
199668462be2edab3dccf4fd318cc672.exe
Resource
win10v2004-20230915-en
General
-
Target
199668462be2edab3dccf4fd318cc672.exe
-
Size
3.2MB
-
MD5
199668462be2edab3dccf4fd318cc672
-
SHA1
36e228f9c499eb8a77eef9eec2fd7fa188c8403e
-
SHA256
9200a8a400865b02e3ed94fbaaf553bf6c7b52ee8d50fcc2671c2f41c1513812
-
SHA512
ca4216b3850dedca0a7cd92e0681cdd0bf2d7a5c5fbb1d364e8d2d7b103408567f56ab01f31e55cfb6992f07d505f82f0b242fd53a29f9934aaa9dac09e99eab
-
SSDEEP
98304:Z17NGWdUu8oibIXPkfqIkQ9n2N7HhyN2mTBNS:bBGWdU9feQQLhtE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1108 IsPublic.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4392 set thread context of 4876 4392 199668462be2edab3dccf4fd318cc672.exe 97 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4392 199668462be2edab3dccf4fd318cc672.exe Token: SeDebugPrivilege 4876 199668462be2edab3dccf4fd318cc672.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4392 wrote to memory of 4876 4392 199668462be2edab3dccf4fd318cc672.exe 97 PID 4392 wrote to memory of 4876 4392 199668462be2edab3dccf4fd318cc672.exe 97 PID 4392 wrote to memory of 4876 4392 199668462be2edab3dccf4fd318cc672.exe 97 PID 4392 wrote to memory of 4876 4392 199668462be2edab3dccf4fd318cc672.exe 97 PID 4392 wrote to memory of 4876 4392 199668462be2edab3dccf4fd318cc672.exe 97 PID 4392 wrote to memory of 4876 4392 199668462be2edab3dccf4fd318cc672.exe 97 PID 4392 wrote to memory of 4876 4392 199668462be2edab3dccf4fd318cc672.exe 97 PID 4392 wrote to memory of 4876 4392 199668462be2edab3dccf4fd318cc672.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\199668462be2edab3dccf4fd318cc672.exe"C:\Users\Admin\AppData\Local\Temp\199668462be2edab3dccf4fd318cc672.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\199668462be2edab3dccf4fd318cc672.exeC:\Users\Admin\AppData\Local\Temp\199668462be2edab3dccf4fd318cc672.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Users\Admin\AppData\Local\PercentGroupSizes\opdgiur\IsPublic.exeC:\Users\Admin\AppData\Local\PercentGroupSizes\opdgiur\IsPublic.exe1⤵
- Executes dropped EXE
PID:1108
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\199668462be2edab3dccf4fd318cc672.exe.log
Filesize1KB
MD5f7047b64aa01f9d80c7a5e177ce2485c
SHA1bab6005f4a30f12ee36b9abf6bfdfaa5411bbff8
SHA256807356d2424d2d04f51ebd56f926d4d5a8318bc947c76569a3b5ca2c2f279915
SHA512a9af5ace72eb66a6156a5d8764031cdc46feefffabb6898651f91a5af7f3bcef645e63e8d01ed35f1105e824d6830f6fa97e70adda2d5b148ffaff5f54ca248f
-
Filesize
1.6MB
MD548404f7b27744c3e5fdbc2aeff625ec1
SHA1068e0cb991929d4a051ef8a9b4f6d1ea2a194a89
SHA2566c200ccbf382d0ac1b6fc1b4cff7d6c657735697b64496f648cb19bb464b404f
SHA5127c567754e1ea10bbba4b7ee95aaa176353e10101846b54410ffee423d56dd1d20c8ece8d965052a36ec30174de7b7225fa07ad1d2b60a0185806aa855da672e1
-
Filesize
384KB
MD535249c43856f5efa029b09e428f0ebc5
SHA199736098c4ca18dd58cbf4ab9017d46e9b0bafde
SHA2564fddd5a32b14cb32ca13b803545cc9c2100e4c998a7a820773ed39a130e44f90
SHA512be476ef52cb6535c649287c6b6fe163793bd28d0aea374f4f575a226e1d14c5fc0f77077c7a4610540380f05ef1d78b80c27465c01b1ac63488cca5989e1036c