Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2023 20:49
Behavioral task
behavioral1
Sample
2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe
Resource
win10v2004-20231130-en
General
-
Target
2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe
-
Size
72KB
-
MD5
1c298039c674d1243bffd7189636b229
-
SHA1
305a79eb4d2c48edc2c11765b1d6e8b418d74fef
-
SHA256
2737636e7f7223317dc5706c4d69b4d9b0bc9a15c89658c3ce67566f18665eb7
-
SHA512
174d50913a54e4c0d430a5dc932e899ed544482703bb7a5065086d5f1ca14fbbfb75dd3d12725c186443b60ebde6d8114b6c017e78071497ca6345f91991dec8
-
SSDEEP
384:ZZyLHIYz/wpa9GP4Uy2vXy2m4M4SlhUrl9D9O5UE5QzwBlpJNakkjh/TzF7pWnyV:7EIKR4gh2vyVcS+wvQO+Dt+L
Malware Config
Signatures
-
Drops startup file 2 IoCs
Processes:
2040-8-0x0000000001E80000-0x0000000001E92000-memory.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java update.exe 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2040-8-0x0000000001E80000-0x0000000001E92000-memory.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3936660601-1848837011-2142350499-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe\" .." 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe\" .." 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
2040-8-0x0000000001E80000-0x0000000001E92000-memory.exepid process 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
Processes:
2040-8-0x0000000001E80000-0x0000000001E92000-memory.exedescription pid process Token: SeDebugPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: 33 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe Token: SeIncBasePriorityPrivilege 4596 2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe"C:\Users\Admin\AppData\Local\Temp\2040-8-0x0000000001E80000-0x0000000001E92000-memory.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4596