Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09/10/2023, 10:24
Behavioral task
behavioral1
Sample
999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe
Resource
win10v2004-20230915-en
General
-
Target
999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe
-
Size
715KB
-
MD5
9624fcdfbe8cc7b9525ba83e88432c37
-
SHA1
504f631044accfd8037b151300d3c2675bfca7c1
-
SHA256
999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673
-
SHA512
7ff20f1592af1afc9bf04d76866e3672986a761b63ee651137ebd2047ef9af71faa7b277c3fedb5254e5af102db86bcf916018558911ca7788f9e713efe05210
-
SSDEEP
12288:E2hWqY6jkFzcBZV4JiNSzYElBmu6i8B+MdTS3PgF9N1EXLTMZ3xFSpiOoF/4AiqT:EKLMeZKJLXOi8B+3c9XULAZhFSAFF/Ga
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2012 created 484 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 1 -
Deletes itself 1 IoCs
pid Process 2708 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2120 mncct.exe -
Loads dropped DLL 2 IoCs
pid Process 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 2120 mncct.exe -
resource yara_rule behavioral1/memory/2012-1-0x0000000000F40000-0x00000000010C0000-memory.dmp vmprotect behavioral1/memory/2012-0-0x0000000000F40000-0x00000000010C0000-memory.dmp vmprotect behavioral1/memory/2012-13-0x0000000000F40000-0x00000000010C0000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 2120 mncct.exe 2120 mncct.exe 2120 mncct.exe 2120 mncct.exe 2120 mncct.exe 2120 mncct.exe 2120 mncct.exe 2120 mncct.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe Token: SeDebugPrivilege 2120 mncct.exe Token: SeIncBasePriorityPrivilege 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2120 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 28 PID 2012 wrote to memory of 2120 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 28 PID 2012 wrote to memory of 2120 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 28 PID 2012 wrote to memory of 2120 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 28 PID 2012 wrote to memory of 2708 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 29 PID 2012 wrote to memory of 2708 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 29 PID 2012 wrote to memory of 2708 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 29 PID 2012 wrote to memory of 2708 2012 999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe 29
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:484
-
C:\Users\Admin\AppData\Local\Temp\mncct.exeC:\Users\Admin\AppData\Local\Temp\mncct.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe"C:\Users\Admin\AppData\Local\Temp\999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\999396ef653e77f7fd6ef685fc7ca54de66c19b39e17a5986bfd99130a03b673.exe"2⤵
- Deletes itself
PID:2708
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5a03f9e167ade17c57fd44c4648e3f18f
SHA1b93e9cfa28c7c3cfe45463826a868c8521f9d259
SHA256cc20eab9f678fabf13e3b8f431e52482fef4c0dee23a8ae8da157d37e068e76a
SHA51203663ef0ce7d6c468d41216c2e14f361ec20b95ac8315b09a1d9f169fdfc6a9bab7fa6fa0ac3526a19b723654556f76f9d9802dfc82f85329b058c5fd46c74ec
-
Filesize
805KB
MD5821669b2f2722151a7c24bcfea419f73
SHA1aa2d6b1d5e3be59b2f2b6a9ec73a34f9eeca3128
SHA2564af1afc73a541b09a801fa824442155a953ab432c42ebe1b6fcc34a684e34079
SHA512bd4f489d1cc1b65f89dae7d3151273a6cd53093e5dd870d6df71cb118d9a91295bd3aeb8757abcb73d2868b1a93960ad59649dcc0d9d38cd44d83f8e3a66249e
-
Filesize
1.1MB
MD5a03f9e167ade17c57fd44c4648e3f18f
SHA1b93e9cfa28c7c3cfe45463826a868c8521f9d259
SHA256cc20eab9f678fabf13e3b8f431e52482fef4c0dee23a8ae8da157d37e068e76a
SHA51203663ef0ce7d6c468d41216c2e14f361ec20b95ac8315b09a1d9f169fdfc6a9bab7fa6fa0ac3526a19b723654556f76f9d9802dfc82f85329b058c5fd46c74ec