Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 22:32
Static task
static1
Behavioral task
behavioral1
Sample
16019f17e7ea965f721a9c7e2fa50af8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16019f17e7ea965f721a9c7e2fa50af8.exe
Resource
win10v2004-20231215-en
General
-
Target
16019f17e7ea965f721a9c7e2fa50af8.exe
-
Size
312KB
-
MD5
16019f17e7ea965f721a9c7e2fa50af8
-
SHA1
0e708a810cacf517ad5792332deb13bcdaf7b38e
-
SHA256
054e6decfbdcbf37e7fdd2f821d9e501b6c3807218c22bebf55308fd2e47d97c
-
SHA512
079937b9ddfc272db6b01919749357ddb304ac0fd8b2a40ba0b484372c31955f57a058b6f7b8a41d2f9db8558294644d4ce378d4c55bec9247dc9a4ad112eb68
-
SSDEEP
6144:8weks+CRE0mfLS8zW1Osdnp1PuJ93ZLYT:5eknCO0mzS8UnpaM
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2660 16019f17e7ea965f721a9c7e2fa50af8.exe 2660 16019f17e7ea965f721a9c7e2fa50af8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 16019f17e7ea965f721a9c7e2fa50af8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2660 16019f17e7ea965f721a9c7e2fa50af8.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2660 16019f17e7ea965f721a9c7e2fa50af8.exe 2660 16019f17e7ea965f721a9c7e2fa50af8.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242KB
MD546abad63ed5a1a264515f158a08dd410
SHA196bf993cbf8245c2adcdf305f6f8b2e2579f5707
SHA2567df243e7fef0e6894b7b5ca9ed12598c61ad92706d54b795c871ff32559199e7
SHA51217d6d52b04ee0d29aa18ec7eacf468cf62414479165ce11bef23e1446780611ff41fb1f2b596f34e67c90e691d3ddece87f9acf26c4569b28df3d8dbdaa58243