Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 14:53
Static task
static1
Behavioral task
behavioral1
Sample
ceaef0b994fcd2b1532ff86cf4fd1bc4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ceaef0b994fcd2b1532ff86cf4fd1bc4.exe
Resource
win10v2004-20231215-en
General
-
Target
ceaef0b994fcd2b1532ff86cf4fd1bc4.exe
-
Size
506KB
-
MD5
ceaef0b994fcd2b1532ff86cf4fd1bc4
-
SHA1
b18c932e81d3ede355defc23ac92be9d0bf96579
-
SHA256
e8d18aeabb6046744448dad8929caf1367b53017ad963e44209b9d9ae070dd83
-
SHA512
3575fd6b68a405ad2c6175cc9ad85ebe61b3cffa540b22f5bdc18d299b88cf32bcbd85512cc298af7a3fe96800b4714a354a8817e010a28c1da492829e1c29ca
-
SSDEEP
6144:LZY4PW42YOoJF9GkEqA8qYFqkIeODYa/UBT5GtPdfaDOh5YvAHlqyK2uZ4EChV7S:Ekq8qYF6DY46GtiaSowyK2tKj2c
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2704 ceaef0b994fcd2b1532ff86cf4fd1bc4.exe -
Loads dropped DLL 1 IoCs
pid Process 1996 ceaef0b994fcd2b1532ff86cf4fd1bc4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\Default Key = "C:\\Users\\Admin\\AppData\\Local\\Default Folder\\system.exe" ceaef0b994fcd2b1532ff86cf4fd1bc4.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\Default Key = "\\Default Folder\\system.exe" ceaef0b994fcd2b1532ff86cf4fd1bc4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2600 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 ceaef0b994fcd2b1532ff86cf4fd1bc4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1996 ceaef0b994fcd2b1532ff86cf4fd1bc4.exe Token: SeDebugPrivilege 2704 ceaef0b994fcd2b1532ff86cf4fd1bc4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2704 ceaef0b994fcd2b1532ff86cf4fd1bc4.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2704 1996 ceaef0b994fcd2b1532ff86cf4fd1bc4.exe 28 PID 1996 wrote to memory of 2704 1996 ceaef0b994fcd2b1532ff86cf4fd1bc4.exe 28 PID 1996 wrote to memory of 2704 1996 ceaef0b994fcd2b1532ff86cf4fd1bc4.exe 28 PID 1996 wrote to memory of 2704 1996 ceaef0b994fcd2b1532ff86cf4fd1bc4.exe 28 PID 1996 wrote to memory of 2804 1996 ceaef0b994fcd2b1532ff86cf4fd1bc4.exe 29 PID 1996 wrote to memory of 2804 1996 ceaef0b994fcd2b1532ff86cf4fd1bc4.exe 29 PID 1996 wrote to memory of 2804 1996 ceaef0b994fcd2b1532ff86cf4fd1bc4.exe 29 PID 1996 wrote to memory of 2804 1996 ceaef0b994fcd2b1532ff86cf4fd1bc4.exe 29 PID 2804 wrote to memory of 2600 2804 cmd.exe 31 PID 2804 wrote to memory of 2600 2804 cmd.exe 31 PID 2804 wrote to memory of 2600 2804 cmd.exe 31 PID 2804 wrote to memory of 2600 2804 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceaef0b994fcd2b1532ff86cf4fd1bc4.exe"C:\Users\Admin\AppData\Local\Temp\ceaef0b994fcd2b1532ff86cf4fd1bc4.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\ceaef0b994fcd2b1532ff86cf4fd1bc4\ceaef0b994fcd2b1532ff86cf4fd1bc4.exe"C:\Users\Admin\AppData\Local\Temp\ceaef0b994fcd2b1532ff86cf4fd1bc4\ceaef0b994fcd2b1532ff86cf4fd1bc4.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\ceaef0b994fcd2b1532ff86cf4fd1bc4.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54B
MD500d4221dbaf4c26c94359ed7ce15f51b
SHA13fdd54231ba5c28a6f080fcfcaf16f054f0fffa0
SHA256c950aedc37c5607487c742860fc8aadd664aa7d7f30a7c422214de424ee19b64
SHA5129e5aae200c94be595bce469ea45021b984c8dcfe5eb845e90c2a4138f7c7a98777a630aa5782525b3ea325a5f229a8a8a39ca61320fcef9fe457318087ff7b45
-
\Users\Admin\AppData\Local\Temp\ceaef0b994fcd2b1532ff86cf4fd1bc4\ceaef0b994fcd2b1532ff86cf4fd1bc4.exe
Filesize506KB
MD5ceaef0b994fcd2b1532ff86cf4fd1bc4
SHA1b18c932e81d3ede355defc23ac92be9d0bf96579
SHA256e8d18aeabb6046744448dad8929caf1367b53017ad963e44209b9d9ae070dd83
SHA5123575fd6b68a405ad2c6175cc9ad85ebe61b3cffa540b22f5bdc18d299b88cf32bcbd85512cc298af7a3fe96800b4714a354a8817e010a28c1da492829e1c29ca