Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
23/11/2023, 14:15
Behavioral task
behavioral1
Sample
d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe
Resource
win10v2004-20231020-en
General
-
Target
d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe
-
Size
956KB
-
MD5
a76e4524ca0512bffbc8d32fe8283221
-
SHA1
969020573d63aba67b23c7b9a4e9c8ca52094be3
-
SHA256
d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc
-
SHA512
1416be39a24b9d0ef4d4bea9b8aba58cd6f573ca99e4f576f5a06c127cc4661d4d9c1f46c367822358cc4207a3b735ca8fde432faf88ddbf1b11c1921fb1c1fa
-
SSDEEP
24576:tVP4iQzePuruuXj/catsYQD8PYxOrQlhSri:tWBj/catsYZPY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1740 sg.tmp -
Loads dropped DLL 1 IoCs
pid Process 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe -
resource yara_rule behavioral1/memory/1244-0-0x0000000000400000-0x000000000057D000-memory.dmp upx behavioral1/memory/1244-12-0x0000000000400000-0x000000000057D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeBackupPrivilege 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe Token: SeRestorePrivilege 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe Token: 33 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe Token: SeIncBasePriorityPrivilege 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe Token: 33 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe Token: SeIncBasePriorityPrivilege 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe Token: 33 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe Token: SeIncBasePriorityPrivilege 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe Token: SeRestorePrivilege 1740 sg.tmp Token: 35 1740 sg.tmp Token: SeSecurityPrivilege 1740 sg.tmp Token: SeSecurityPrivilege 1740 sg.tmp Token: SeDebugPrivilege 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2224 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe 28 PID 1244 wrote to memory of 2224 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe 28 PID 1244 wrote to memory of 2224 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe 28 PID 1244 wrote to memory of 2224 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe 28 PID 1244 wrote to memory of 1740 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe 30 PID 1244 wrote to memory of 1740 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe 30 PID 1244 wrote to memory of 1740 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe 30 PID 1244 wrote to memory of 1740 1244 d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe"C:\Users\Admin\AppData\Local\Temp\d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\cmd.execmd.exe /c set2⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\~1500504759743765160~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\d1016cdfba706c2ea0da9096495226b859e53606d4d3e5f55d866ad60b9511cc.exe" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\~113162492070131173"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516