Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2023 07:08
Static task
static1
Behavioral task
behavioral1
Sample
7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe
Resource
win10v2004-20231020-en
General
-
Target
7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe
-
Size
816KB
-
MD5
724201ceec6e60e76435b1dd45f654d3
-
SHA1
6550ac7877ef90d834e4f26a82577ee9afacf9b4
-
SHA256
7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b
-
SHA512
073f6f6d2dec492da85434cc28d6e8a5fd47e4786b8dd4fbee2ef91c00aed8ba3207231e63f54a2f190741d1ff589834b68a1de5cb413b71efc24681a0a02c83
-
SSDEEP
24576:vY4G2qLMJalsnqShyoo77lUabuSvbDQOOdIxJsG90:A3XZynV4oDabuWbDQOcIxJJ90
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2780 1F0B0F0C120B156B155B15D0C0F160C0A160A.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4232 7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe 2780 1F0B0F0C120B156B155B15D0C0F160C0A160A.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1880 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4232 wrote to memory of 2780 4232 7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe 86 PID 4232 wrote to memory of 2780 4232 7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe 86 PID 4232 wrote to memory of 2780 4232 7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe"C:\Users\Admin\AppData\Local\Temp\7269abb948e447e397d849b825aa224b96186a06dedacef47428ee8dffc4166b.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\1F0B0F0C120B156B155B15D0C0F160C0A160A.exeC:\Users\Admin\AppData\Local\Temp\1F0B0F0C120B156B155B15D0C0F160C0A160A.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2780
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4524
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1880
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD56f6a89dfaa3c5726f73324dbefd723df
SHA1c85f4abc04d0612e4ee3e038dbb643a7e2072a14
SHA2569cc23ba6e32460e3288190bd21f841014392839e852c13282d46d85040012221
SHA512e53cb5effe48efc789bebc899794222d9147e1e475907bd47b480dd51a45f79573e09dba0b4b4951966761645a6558eb99b37c203b3097f6cff3b1ca672ad9a4
-
Filesize
816KB
MD58f58d548a5ceeae448fad319f8759686
SHA18ba8e94ed9d66dd03cd8253f9747962c8736f111
SHA256f4ebb177b969a2ef3cadb5d9017dc511a7136e6ca161920e0ca465a1d24a2d9b
SHA512ee6d5fc41560899fe48fc388881f0078e3f34d5321d8d90f541d45279575128fd71084809b1c6cf6fd2becb9407421964121b29471585789e8e4d42908ffdfe0
-
Filesize
816KB
MD58f58d548a5ceeae448fad319f8759686
SHA18ba8e94ed9d66dd03cd8253f9747962c8736f111
SHA256f4ebb177b969a2ef3cadb5d9017dc511a7136e6ca161920e0ca465a1d24a2d9b
SHA512ee6d5fc41560899fe48fc388881f0078e3f34d5321d8d90f541d45279575128fd71084809b1c6cf6fd2becb9407421964121b29471585789e8e4d42908ffdfe0