Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 21:54
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20230915-en
General
-
Target
Loader.exe
-
Size
5.0MB
-
MD5
e9a24c7a42f9b296cc1e31dc3ea73b2b
-
SHA1
06e9607fb973400f0f110854ce90382965cd43d9
-
SHA256
03ee5437a1dad818f417db18dd50e16bc08c890b442874d841cd1a6a643c4010
-
SHA512
48af794e0042ce3cea37ff11e3f9b74d0a8e463018fc827d7ef459cc58252a5f436632c19b5d4674a6b54f02543005a294ef94f86d46d1ecff574ba6fab0464b
-
SSDEEP
98304:XrdCegVSGMzByLXMfivQayGnOht5RTc7kjRX1LNNDw7:waGMlyLXvvQdmmt5RTcGzLNe7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4868 L93U4QUGOK.exe -
resource yara_rule behavioral2/memory/4712-0-0x00007FF725450000-0x00007FF725E70000-memory.dmp vmprotect behavioral2/files/0x00070000000231ba-7.dat vmprotect behavioral2/files/0x00070000000231ba-6.dat vmprotect behavioral2/memory/4868-8-0x00007FF631C60000-0x00007FF632679000-memory.dmp vmprotect -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 3848 ipconfig.exe 3016 ipconfig.exe 4908 ipconfig.exe -
Kills process with taskkill 2 IoCs
pid Process 3716 taskkill.exe 1160 taskkill.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2296 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3716 taskkill.exe Token: SeDebugPrivilege 1160 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4712 Loader.exe 4868 L93U4QUGOK.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 4712 wrote to memory of 4632 4712 Loader.exe 84 PID 4712 wrote to memory of 4632 4712 Loader.exe 84 PID 4632 wrote to memory of 4116 4632 cmd.exe 85 PID 4632 wrote to memory of 4116 4632 cmd.exe 85 PID 4116 wrote to memory of 4028 4116 net.exe 86 PID 4116 wrote to memory of 4028 4116 net.exe 86 PID 4712 wrote to memory of 4092 4712 Loader.exe 87 PID 4712 wrote to memory of 4092 4712 Loader.exe 87 PID 4092 wrote to memory of 2688 4092 cmd.exe 88 PID 4092 wrote to memory of 2688 4092 cmd.exe 88 PID 4712 wrote to memory of 3916 4712 Loader.exe 89 PID 4712 wrote to memory of 3916 4712 Loader.exe 89 PID 3916 wrote to memory of 3716 3916 cmd.exe 90 PID 3916 wrote to memory of 3716 3916 cmd.exe 90 PID 4712 wrote to memory of 1904 4712 Loader.exe 92 PID 4712 wrote to memory of 1904 4712 Loader.exe 92 PID 1904 wrote to memory of 3848 1904 cmd.exe 93 PID 1904 wrote to memory of 3848 1904 cmd.exe 93 PID 4712 wrote to memory of 4168 4712 Loader.exe 94 PID 4712 wrote to memory of 4168 4712 Loader.exe 94 PID 4168 wrote to memory of 3016 4168 cmd.exe 95 PID 4168 wrote to memory of 3016 4168 cmd.exe 95 PID 4712 wrote to memory of 4868 4712 Loader.exe 104 PID 4712 wrote to memory of 4868 4712 Loader.exe 104 PID 4712 wrote to memory of 3856 4712 Loader.exe 105 PID 4712 wrote to memory of 3856 4712 Loader.exe 105 PID 3856 wrote to memory of 2296 3856 cmd.exe 107 PID 3856 wrote to memory of 2296 3856 cmd.exe 107 PID 4868 wrote to memory of 5080 4868 L93U4QUGOK.exe 108 PID 4868 wrote to memory of 5080 4868 L93U4QUGOK.exe 108 PID 5080 wrote to memory of 1656 5080 cmd.exe 109 PID 5080 wrote to memory of 1656 5080 cmd.exe 109 PID 1656 wrote to memory of 2548 1656 net.exe 110 PID 1656 wrote to memory of 2548 1656 net.exe 110 PID 4868 wrote to memory of 4100 4868 L93U4QUGOK.exe 112 PID 4868 wrote to memory of 4100 4868 L93U4QUGOK.exe 112 PID 4100 wrote to memory of 1208 4100 cmd.exe 113 PID 4100 wrote to memory of 1208 4100 cmd.exe 113 PID 4868 wrote to memory of 3804 4868 L93U4QUGOK.exe 114 PID 4868 wrote to memory of 3804 4868 L93U4QUGOK.exe 114 PID 3804 wrote to memory of 1160 3804 cmd.exe 115 PID 3804 wrote to memory of 1160 3804 cmd.exe 115 PID 4868 wrote to memory of 1520 4868 L93U4QUGOK.exe 116 PID 4868 wrote to memory of 1520 4868 L93U4QUGOK.exe 116 PID 1520 wrote to memory of 4908 1520 cmd.exe 117 PID 1520 wrote to memory of 4908 1520 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time2⤵
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\system32\net.exenet start w32time3⤵
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time4⤵PID:4028
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync /nowait2⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\system32\w32tm.exew32tm /resync /nowait3⤵PID:2688
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\system32\taskkill.exetaskkill /IM RainbowSix.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:3848
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:3016
-
-
-
C:\Users\Admin\AppData\Local\Temp\L93U4QUGOK.exe"C:\Users\Admin\AppData\Local\Temp\L93U4QUGOK.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time3⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\system32\net.exenet start w32time4⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time5⤵PID:2548
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync /nowait3⤵
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\system32\w32tm.exew32tm /resync /nowait4⤵PID:1208
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /f3⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\system32\taskkill.exetaskkill /IM RainbowSix.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns3⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\ipconfig.exeipconfig /flushdns4⤵
- Gathers network information
PID:4908
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\Loader.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2296
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.0MB
MD5f455057a674e6e2ad8342a1d58b1b6bf
SHA16cf8618a52a3e361d362af9a3112a61cc167bb87
SHA256e76905b095e469e2a06506644a33f6c6c9509a56d3c6bf2aec86d035beaf6875
SHA512fda77cb230dd84d7153b81d52fe8c3cf470cb490ec80f81f41ba7a454b168ee640ac35feacb2c2fd579e23a4fd45fb890ae24c6217decfb7e53ccc745b711e26
-
Filesize
5.0MB
MD5f455057a674e6e2ad8342a1d58b1b6bf
SHA16cf8618a52a3e361d362af9a3112a61cc167bb87
SHA256e76905b095e469e2a06506644a33f6c6c9509a56d3c6bf2aec86d035beaf6875
SHA512fda77cb230dd84d7153b81d52fe8c3cf470cb490ec80f81f41ba7a454b168ee640ac35feacb2c2fd579e23a4fd45fb890ae24c6217decfb7e53ccc745b711e26