Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09/10/2023, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
6fd75c70343ef41a2d7d03a299049544a6f2892d8e550ddf30352f1789b4a2f4.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6fd75c70343ef41a2d7d03a299049544a6f2892d8e550ddf30352f1789b4a2f4.exe
Resource
win10v2004-20230915-en
General
-
Target
6fd75c70343ef41a2d7d03a299049544a6f2892d8e550ddf30352f1789b4a2f4.exe
-
Size
2.0MB
-
MD5
5916a55d193cc7fd9b9bea7bec11ae87
-
SHA1
0114a22620cf5af902bafdafc7ac935928d9216f
-
SHA256
6fd75c70343ef41a2d7d03a299049544a6f2892d8e550ddf30352f1789b4a2f4
-
SHA512
d85edda23c6bbc3dba896d29ea4f36bbf8c57aef2813be7d5052fc5e7905815320d89ed1a1b520385dd23cd969bffcd7c837074398ed7e335bd7c224b0eca63d
-
SSDEEP
24576:pV9XrD0U9T/YvvcVYXI6c4cKf+NeKyLYiT87RFEKGMG0O8Ij8UuRyDGggw:pXroU9T/YXcVYXI6c4z+NDo87vEbZk3Y
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2128-1-0x0000000010000000-0x0000000010018000-memory.dmp upx behavioral1/memory/2128-2-0x0000000010000000-0x0000000010018000-memory.dmp upx behavioral1/memory/2128-46-0x0000000010000000-0x0000000010018000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2128 6fd75c70343ef41a2d7d03a299049544a6f2892d8e550ddf30352f1789b4a2f4.exe 2128 6fd75c70343ef41a2d7d03a299049544a6f2892d8e550ddf30352f1789b4a2f4.exe 2128 6fd75c70343ef41a2d7d03a299049544a6f2892d8e550ddf30352f1789b4a2f4.exe 2128 6fd75c70343ef41a2d7d03a299049544a6f2892d8e550ddf30352f1789b4a2f4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2128 6fd75c70343ef41a2d7d03a299049544a6f2892d8e550ddf30352f1789b4a2f4.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2128 6fd75c70343ef41a2d7d03a299049544a6f2892d8e550ddf30352f1789b4a2f4.exe 2128 6fd75c70343ef41a2d7d03a299049544a6f2892d8e550ddf30352f1789b4a2f4.exe 2128 6fd75c70343ef41a2d7d03a299049544a6f2892d8e550ddf30352f1789b4a2f4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fd75c70343ef41a2d7d03a299049544a6f2892d8e550ddf30352f1789b4a2f4.exe"C:\Users\Admin\AppData\Local\Temp\6fd75c70343ef41a2d7d03a299049544a6f2892d8e550ddf30352f1789b4a2f4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38B
MD55b6f51ca75a7a7f42a9ab2637af1fbf0
SHA10f391752d62a886fb659371fa42e8a96faa8c287
SHA256b0935119f817d4495d6a54ab9abcd9c83e49c1d188d209fda583914ec1d727cb
SHA512a3163167fb09bc6d61958670843e52fc143ab915e6f47d82e3db152cc005a10ad2c9ad0ee13a80fb6e8a4545948c11ed5529a81b78dd5f1e0d8de90f68d1508c