Analysis
-
max time kernel
152s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
967548928.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
967548928.exe
Resource
win10v2004-20230915-en
General
-
Target
967548928.exe
-
Size
7.5MB
-
MD5
848186a88b0b2698fc6966c129b3f988
-
SHA1
47d48802379460ab5ee2e31f57b7b4ecf88846f6
-
SHA256
4381d4a66eb1f618508864f87c6da09c67cfea42e21070823326f1ee45fb7b36
-
SHA512
50c59689cda8bfa0f85faf957db895dc65013511630ba9978d8c7024f083db8248d9ea47b7e8a54e500a8b120e7b6032f9735961cf2c480226c20432a13e46a8
-
SSDEEP
98304:TOkNKDlogmxjvwTNWF+oVQVbsYb7smpc1aT9GvrVMv/cLUpJl7pUhGaZmCCTQJx+:at+gmxjvwTNh/hpL0KvZlWhGwjEQS
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2924 967548928.exe -
Loads dropped DLL 1 IoCs
pid Process 3028 967548928.exe -
Obfuscated with Agile.Net obfuscator 7 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/3028-4-0x0000000000400000-0x0000000000FA3000-memory.dmp agile_net behavioral1/memory/3028-16-0x0000000000400000-0x0000000000FA3000-memory.dmp agile_net behavioral1/memory/3028-19-0x0000000000400000-0x0000000000FA3000-memory.dmp agile_net behavioral1/memory/3028-20-0x0000000000400000-0x0000000000FA3000-memory.dmp agile_net behavioral1/memory/3028-23-0x0000000000400000-0x0000000000FA3000-memory.dmp agile_net behavioral1/memory/3028-26-0x0000000000400000-0x0000000000FA3000-memory.dmp agile_net behavioral1/memory/2924-250-0x0000000000400000-0x0000000000FA9000-memory.dmp agile_net -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3028 967548928.exe 2924 967548928.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2044 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3028 967548928.exe 2924 967548928.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3028 967548928.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3028 967548928.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2924 3028 967548928.exe 30 PID 3028 wrote to memory of 2924 3028 967548928.exe 30 PID 3028 wrote to memory of 2924 3028 967548928.exe 30 PID 3028 wrote to memory of 2924 3028 967548928.exe 30 PID 3028 wrote to memory of 1852 3028 967548928.exe 31 PID 3028 wrote to memory of 1852 3028 967548928.exe 31 PID 3028 wrote to memory of 1852 3028 967548928.exe 31 PID 3028 wrote to memory of 1852 3028 967548928.exe 31 PID 1852 wrote to memory of 2044 1852 cmd.exe 33 PID 1852 wrote to memory of 2044 1852 cmd.exe 33 PID 1852 wrote to memory of 2044 1852 cmd.exe 33 PID 1852 wrote to memory of 2044 1852 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\967548928.exe"C:\Users\Admin\AppData\Local\Temp\967548928.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\967548928.exe"C:\Users\Admin\AppData\Local\Temp\967548928.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout /T 3 & del "C:\Users\Admin\AppData\Local\Temp\*.tmp"2⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\timeout.exetimeout /T 33⤵
- Delays execution with timeout.exe
PID:2044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.5MB
MD5c779dc49ccf55ca8d382e1ab646cf383
SHA173a5fc3cf86a26b57b28f6b340f9e6194c38bd21
SHA2560a816f8479cbccb30ae2ae6a693a3ac60c49614414a59b155b1063e582f3b92e
SHA51273aaee51f494fb6742a3f46b66c25cca04b3d8fb04af4eb70b04ab3a9663d5b434219c639c88dc9d4059c69e4174c603fb55d9840262c9fd8430e18ce7e510c3
-
Filesize
7.5MB
MD5c779dc49ccf55ca8d382e1ab646cf383
SHA173a5fc3cf86a26b57b28f6b340f9e6194c38bd21
SHA2560a816f8479cbccb30ae2ae6a693a3ac60c49614414a59b155b1063e582f3b92e
SHA51273aaee51f494fb6742a3f46b66c25cca04b3d8fb04af4eb70b04ab3a9663d5b434219c639c88dc9d4059c69e4174c603fb55d9840262c9fd8430e18ce7e510c3
-
Filesize
7.5MB
MD5c779dc49ccf55ca8d382e1ab646cf383
SHA173a5fc3cf86a26b57b28f6b340f9e6194c38bd21
SHA2560a816f8479cbccb30ae2ae6a693a3ac60c49614414a59b155b1063e582f3b92e
SHA51273aaee51f494fb6742a3f46b66c25cca04b3d8fb04af4eb70b04ab3a9663d5b434219c639c88dc9d4059c69e4174c603fb55d9840262c9fd8430e18ce7e510c3
-
Filesize
7.5MB
MD5c779dc49ccf55ca8d382e1ab646cf383
SHA173a5fc3cf86a26b57b28f6b340f9e6194c38bd21
SHA2560a816f8479cbccb30ae2ae6a693a3ac60c49614414a59b155b1063e582f3b92e
SHA51273aaee51f494fb6742a3f46b66c25cca04b3d8fb04af4eb70b04ab3a9663d5b434219c639c88dc9d4059c69e4174c603fb55d9840262c9fd8430e18ce7e510c3