Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 14:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
01c66093291b269393c3d10d8695b3aa.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
01c66093291b269393c3d10d8695b3aa.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
01c66093291b269393c3d10d8695b3aa.exe
-
Size
48KB
-
MD5
01c66093291b269393c3d10d8695b3aa
-
SHA1
1907c2cd8c3d48b68b3c2fd5b6bff018720f88a5
-
SHA256
20bb05064c20c04a6ce838cc1ca7c12073d897d54485c9ba8f73b7e9e6c74cad
-
SHA512
4aa249516386a059e70641ac97b5483e9c74ac60c97fa217db1916617888cb1670feb2085ef7bca1fad67d9c258b47c6f6880e5c1e73aed46a1711dd218bf767
-
SSDEEP
768:hbdl2E31J4yBx4LZekcf/GmephJhwt9x/7h:tdl2Er4GxeeFGAtfh
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6763DFB1-C11A-9377-B795-EA229E369A02} 01c66093291b269393c3d10d8695b3aa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6763DFB1-C11A-9377-B795-EA229E369A02}\stubpath = "%SystemRoot%\\system32\\V3Medic.exe" 01c66093291b269393c3d10d8695b3aa.exe -
Deletes itself 1 IoCs
pid Process 2908 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\V3Medic.exe 01c66093291b269393c3d10d8695b3aa.exe File opened for modification C:\Windows\SysWOW64\V3Medic.exe 01c66093291b269393c3d10d8695b3aa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3028 01c66093291b269393c3d10d8695b3aa.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1652 3028 01c66093291b269393c3d10d8695b3aa.exe 28 PID 3028 wrote to memory of 1652 3028 01c66093291b269393c3d10d8695b3aa.exe 28 PID 3028 wrote to memory of 1652 3028 01c66093291b269393c3d10d8695b3aa.exe 28 PID 3028 wrote to memory of 1652 3028 01c66093291b269393c3d10d8695b3aa.exe 28 PID 3028 wrote to memory of 2908 3028 01c66093291b269393c3d10d8695b3aa.exe 30 PID 3028 wrote to memory of 2908 3028 01c66093291b269393c3d10d8695b3aa.exe 30 PID 3028 wrote to memory of 2908 3028 01c66093291b269393c3d10d8695b3aa.exe 30 PID 3028 wrote to memory of 2908 3028 01c66093291b269393c3d10d8695b3aa.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\01c66093291b269393c3d10d8695b3aa.exe"C:\Users\Admin\AppData\Local\Temp\01c66093291b269393c3d10d8695b3aa.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{6763DFB1-C11A-9377-B795-EA229E369A02}" /f2⤵PID:1652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\01C660~1.EXE > nul2⤵
- Deletes itself
PID:2908
-