Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 10:56
Static task
static1
Behavioral task
behavioral1
Sample
WatchDogs2+11Tr_LNG/WatchDogs2+11Tr_LNG.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
WatchDogs2+11Tr_LNG/WatchDogs2+11Tr_LNG.exe
Resource
win10v2004-20230915-en
General
-
Target
WatchDogs2+11Tr_LNG/WatchDogs2+11Tr_LNG.exe
-
Size
4.0MB
-
MD5
cf87b1724aa43851a6438c7c9fcf997d
-
SHA1
2950d3a43ce1b8dd38d7be1a4cfde7094c348355
-
SHA256
b2c080a134d7a3bb188921c5585dd7012ee4ed86fbec18e7bacceb74f19d948f
-
SHA512
b58e75bd6d9b183673a02b34ead216f5a9e9e59fd2d0718c93efa3927443e5da4626ab9cb1313b97d1c18fabe47ef6ad4f822626ae34024e048c86a0e174d0ea
-
SSDEEP
98304:mCkvLoYGQlAkxpP2vrXG6AXnBNy9aDGL:6vBGIAkxpuvrXGpNy9AG
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe 1144 WatchDogs2+11Tr_LNG.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1144 WatchDogs2+11Tr_LNG.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1144 WatchDogs2+11Tr_LNG.exe Token: 33 3904 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3904 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1144 WatchDogs2+11Tr_LNG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WatchDogs2+11Tr_LNG\WatchDogs2+11Tr_LNG.exe"C:\Users\Admin\AppData\Local\Temp\WatchDogs2+11Tr_LNG\WatchDogs2+11Tr_LNG.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1144
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x508 0x5181⤵
- Suspicious use of AdjustPrivilegeToken
PID:3904
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5c74d260d388f5ac3d95d8c1c3a27c989
SHA15da009086036004a7c670d608d5e1e923aead568
SHA256dc1bebb8ce88d59e4b3130c1ff2c4b7f5df2701c7a71b476b8a6f2ed541db628
SHA5126460db8f73806017d267c0e4e112902956a3bc53853c6a893cff66fe44772305b2c158ef8b58e993806d713aceaddcf2efa7ccf625063678444d3fd20b10546a
-
Filesize
632KB
MD5ddc305fca2a8d80523ad8bc50996480b
SHA17bee723b565267aa355ad9f7f5cf17c74f2cce1f
SHA256af9e46b70c7739547739ddfcdd56b7b218b5bda6e14c49bed3bbc08c2b867216
SHA512acf2064d1b59d73cc5086f9a8c26a5e1fb7e7909e5460d3427d7681ee36709a568146000bbea9464fb173df474c58bda4f87bbbb759ea06ed2fd71d3c6bc0eea
-
Filesize
218KB
MD582dbc53c4e057ad941eb73aba212956e
SHA138a582ce5fbe03e8c5f040d82f89b4797e305860
SHA256eda3f66eedc49ff9b9506c1ccf679a7822104c771eaab3afa367f0d6a2c9bbd5
SHA5126f8e9082750c9cc8eb7bcaf7b7442f52ec55e2b712fff29a3a22868218fbfd605b594314e7be2720fd25f5a89d95774481177429de35acb48d023d39a2767781
-
Filesize
218KB
MD582dbc53c4e057ad941eb73aba212956e
SHA138a582ce5fbe03e8c5f040d82f89b4797e305860
SHA256eda3f66eedc49ff9b9506c1ccf679a7822104c771eaab3afa367f0d6a2c9bbd5
SHA5126f8e9082750c9cc8eb7bcaf7b7442f52ec55e2b712fff29a3a22868218fbfd605b594314e7be2720fd25f5a89d95774481177429de35acb48d023d39a2767781
-
Filesize
832KB
MD56aab5c90d7c703ed4aefd5100c97fd22
SHA1b6bb0a5614da9565d5ef2a5a23aa0aaa5bd5b3f0
SHA2561b796196d9ae7b15507546d53a2b5aeae36e5b80e6291f02317f6fedab18d74a
SHA5126c1c1cc6da08f49d15f6cbbadc81bdfaa4251d9ecc9321e0de474141534b42f2bc4c4ada053ace81e07635478f945d2266466f45f9e55c3c924c974d86c26251