Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
31/10/2023, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe
Resource
win7-20231025-en
General
-
Target
4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe
-
Size
10.3MB
-
MD5
b739c3eba37aa9999fb2d15ab5b9c680
-
SHA1
bb18cc561805efa38545310057bcae4e894d3817
-
SHA256
4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90
-
SHA512
0259b599a7e37426383184110aa828d0797875bab1925186b5b0ca0cb99ed2ae2bceb31f5c83ca3a8ba890bf86bb8cfa75f58d80db3b4ae710828f8ffb36c1ea
-
SSDEEP
196608:56wcPit+w7T+yuSLoGUpTKQ8LY+TRQf3goX3yCJdpHt:5jSKd/+yuQoGUlQepyCJ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2160 Server.exe 2660 Global Ultra Loade PB [2023].exe -
Loads dropped DLL 3 IoCs
pid Process 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2944 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2160 Server.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2944 powershell.exe Token: SeDebugPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe Token: 33 2160 Server.exe Token: SeIncBasePriorityPrivilege 2160 Server.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2944 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe 28 PID 3068 wrote to memory of 2944 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe 28 PID 3068 wrote to memory of 2944 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe 28 PID 3068 wrote to memory of 2944 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe 28 PID 3068 wrote to memory of 2160 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe 30 PID 3068 wrote to memory of 2160 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe 30 PID 3068 wrote to memory of 2160 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe 30 PID 3068 wrote to memory of 2160 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe 30 PID 3068 wrote to memory of 2660 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe 31 PID 3068 wrote to memory of 2660 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe 31 PID 3068 wrote to memory of 2660 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe 31 PID 3068 wrote to memory of 2660 3068 4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe"C:\Users\Admin\AppData\Local\Temp\4d3583917fb1f539f92f945f0f298b2c1766ac27086275600eab721b8e9fbd90.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGsAbQByACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHIAZwBqACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHQAaQBlACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGUAbABqACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\Global Ultra Loade PB [2023].exe"C:\Users\Admin\AppData\Local\Temp\Global Ultra Loade PB [2023].exe"2⤵
- Executes dropped EXE
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
10.2MB
MD58564d4fe3d42c677cef18279c011e18f
SHA19fc9e7f8aec865864eb65d2fa056fb52a8554fab
SHA2562e4ffaed48821bdee7f5fb6bd0d0b5b7231145e40c15d4875aaab01b81dd7fc5
SHA5124ab42cd004255a59cd7e59703af82fe88f293183631179a16624895f48252b0b4f675844ed9615bc3db9a012ea5530366319a6ad8b0cbdeafa758236c9fbd4e0
-
Filesize
10.2MB
MD58564d4fe3d42c677cef18279c011e18f
SHA19fc9e7f8aec865864eb65d2fa056fb52a8554fab
SHA2562e4ffaed48821bdee7f5fb6bd0d0b5b7231145e40c15d4875aaab01b81dd7fc5
SHA5124ab42cd004255a59cd7e59703af82fe88f293183631179a16624895f48252b0b4f675844ed9615bc3db9a012ea5530366319a6ad8b0cbdeafa758236c9fbd4e0
-
Filesize
36KB
MD54e6d2de28a77f3e0b709aafe50346ab2
SHA1c4b9ebe731dd45a9d5334b86021565075a0cf13f
SHA2569bfaa2fd0df9bdfa594d582f8500393ee99de7acb0a24816677745529c425ceb
SHA51271d5eb4e106963e46ddfcdc7a3fa3933aa2727b4d5d1a4244600e08bf435b055c7f85effa23b35d2942d1baf8a4a759a94d69ffb409fb7b7dfc1473dca949c3a
-
Filesize
36KB
MD54e6d2de28a77f3e0b709aafe50346ab2
SHA1c4b9ebe731dd45a9d5334b86021565075a0cf13f
SHA2569bfaa2fd0df9bdfa594d582f8500393ee99de7acb0a24816677745529c425ceb
SHA51271d5eb4e106963e46ddfcdc7a3fa3933aa2727b4d5d1a4244600e08bf435b055c7f85effa23b35d2942d1baf8a4a759a94d69ffb409fb7b7dfc1473dca949c3a
-
Filesize
36KB
MD54e6d2de28a77f3e0b709aafe50346ab2
SHA1c4b9ebe731dd45a9d5334b86021565075a0cf13f
SHA2569bfaa2fd0df9bdfa594d582f8500393ee99de7acb0a24816677745529c425ceb
SHA51271d5eb4e106963e46ddfcdc7a3fa3933aa2727b4d5d1a4244600e08bf435b055c7f85effa23b35d2942d1baf8a4a759a94d69ffb409fb7b7dfc1473dca949c3a
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
10.2MB
MD58564d4fe3d42c677cef18279c011e18f
SHA19fc9e7f8aec865864eb65d2fa056fb52a8554fab
SHA2562e4ffaed48821bdee7f5fb6bd0d0b5b7231145e40c15d4875aaab01b81dd7fc5
SHA5124ab42cd004255a59cd7e59703af82fe88f293183631179a16624895f48252b0b4f675844ed9615bc3db9a012ea5530366319a6ad8b0cbdeafa758236c9fbd4e0
-
Filesize
36KB
MD54e6d2de28a77f3e0b709aafe50346ab2
SHA1c4b9ebe731dd45a9d5334b86021565075a0cf13f
SHA2569bfaa2fd0df9bdfa594d582f8500393ee99de7acb0a24816677745529c425ceb
SHA51271d5eb4e106963e46ddfcdc7a3fa3933aa2727b4d5d1a4244600e08bf435b055c7f85effa23b35d2942d1baf8a4a759a94d69ffb409fb7b7dfc1473dca949c3a
-
Filesize
36KB
MD54e6d2de28a77f3e0b709aafe50346ab2
SHA1c4b9ebe731dd45a9d5334b86021565075a0cf13f
SHA2569bfaa2fd0df9bdfa594d582f8500393ee99de7acb0a24816677745529c425ceb
SHA51271d5eb4e106963e46ddfcdc7a3fa3933aa2727b4d5d1a4244600e08bf435b055c7f85effa23b35d2942d1baf8a4a759a94d69ffb409fb7b7dfc1473dca949c3a