Analysis
-
max time kernel
182s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2023 23:24
Static task
static1
Behavioral task
behavioral1
Sample
5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36.exe
Resource
win10v2004-20230915-en
General
-
Target
5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36.exe
-
Size
1.4MB
-
MD5
4e0c72fa895fd1821158a31e9ec111e2
-
SHA1
b02394c67284e1e411ec89485883198d4464ac33
-
SHA256
5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36
-
SHA512
16ab20839a88b52e209d2c9a18e42a73490bae93200402c02f09e444cf7fee4016a117c4fefbe5a0db98b688349a558ce242763aac82c3e035f1a8708298dfc8
-
SSDEEP
12288:P0P/aK2vB+zY1qaJr+OO3EiehckGFPIYBrH+6fVQ2kLpvtLkKHwonql:PkCKABMaBVmle+vPRjBVSLpvWzo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4968 alg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36.exe File opened for modification C:\Windows\system32\AppVClient.exe 5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36.exe File opened for modification C:\Windows\system32\dllhost.exe 5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1640 5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36.exe"C:\Users\Admin\AppData\Local\Temp\5859d261ac4a2836e02dcc84bf9b63a06ab167245919692306ce6c174cf2dd36.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:4968
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5a382292aeda35d242c25d0a006671307
SHA1e44155ba4589f7c1c3d410d25f68b41669d063d5
SHA2564e06bc40c6eaf7adab17ac0537826f9a1f10813af9c1e613053b2f10e5507cb4
SHA5123102fd5ddee01a6a3d03f2a8a4e6f06bcecc08aeceb7a72a10dcc06fcdcc5225fee96e4084fb55ac329624eaa9229c655d85ed9bc6053899fc7c1dc48f9b162f