Analysis
-
max time kernel
156s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 14:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
01c66093291b269393c3d10d8695b3aa.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
01c66093291b269393c3d10d8695b3aa.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
01c66093291b269393c3d10d8695b3aa.exe
-
Size
48KB
-
MD5
01c66093291b269393c3d10d8695b3aa
-
SHA1
1907c2cd8c3d48b68b3c2fd5b6bff018720f88a5
-
SHA256
20bb05064c20c04a6ce838cc1ca7c12073d897d54485c9ba8f73b7e9e6c74cad
-
SHA512
4aa249516386a059e70641ac97b5483e9c74ac60c97fa217db1916617888cb1670feb2085ef7bca1fad67d9c258b47c6f6880e5c1e73aed46a1711dd218bf767
-
SSDEEP
768:hbdl2E31J4yBx4LZekcf/GmephJhwt9x/7h:tdl2Er4GxeeFGAtfh
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7FA5054F-C6A5-926F-09D2-4284912F8FA7} 01c66093291b269393c3d10d8695b3aa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7FA5054F-C6A5-926F-09D2-4284912F8FA7}\stubpath = "%SystemRoot%\\system32\\V3Medic.exe" 01c66093291b269393c3d10d8695b3aa.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\V3Medic.exe 01c66093291b269393c3d10d8695b3aa.exe File opened for modification C:\Windows\SysWOW64\V3Medic.exe 01c66093291b269393c3d10d8695b3aa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1952 01c66093291b269393c3d10d8695b3aa.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1952 wrote to memory of 852 1952 01c66093291b269393c3d10d8695b3aa.exe 94 PID 1952 wrote to memory of 852 1952 01c66093291b269393c3d10d8695b3aa.exe 94 PID 1952 wrote to memory of 852 1952 01c66093291b269393c3d10d8695b3aa.exe 94 PID 1952 wrote to memory of 4696 1952 01c66093291b269393c3d10d8695b3aa.exe 102 PID 1952 wrote to memory of 4696 1952 01c66093291b269393c3d10d8695b3aa.exe 102 PID 1952 wrote to memory of 4696 1952 01c66093291b269393c3d10d8695b3aa.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\01c66093291b269393c3d10d8695b3aa.exe"C:\Users\Admin\AppData\Local\Temp\01c66093291b269393c3d10d8695b3aa.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{7FA5054F-C6A5-926F-09D2-4284912F8FA7}" /f2⤵PID:852
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\01C660~1.EXE > nul2⤵PID:4696
-