Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
079874bb67fb9edbec599dcf067fd7b5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
079874bb67fb9edbec599dcf067fd7b5.exe
Resource
win10v2004-20231215-en
General
-
Target
079874bb67fb9edbec599dcf067fd7b5.exe
-
Size
626KB
-
MD5
079874bb67fb9edbec599dcf067fd7b5
-
SHA1
6fbbfc1e581dac5628ebc696591e3f7761502c75
-
SHA256
10601a5645fc8fbc4fbe02ff181b9f941bcc3ae5fa09cd57de7c166bc0a6c490
-
SHA512
b56c5a536966ecf3f14be222ee2363b1f60d86e853a008314385f50d1f037fa571e95759e83195ca6feb8e83d8c386de1512f53faf61dfe4990e76640f6056de
-
SSDEEP
12288:P6pyMJfsGop1lcE1LAhDjCZc0kq4g+7tK3+LrNXC4kvAcPy3RdUDQ6IBqwKuft:6yMJfsXaE1LwDGhkLrKGrqwDUEHBJn
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3948-1-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-7-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-120-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-122-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-123-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-121-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-124-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-6-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-5-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-4-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-140-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-142-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-157-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-162-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-158-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-178-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-177-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-179-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-180-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-181-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-183-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-186-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-187-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-189-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-190-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-191-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-192-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-193-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-196-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-197-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-198-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-199-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-200-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-201-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-203-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-202-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-208-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-207-0x00000000022F0000-0x0000000002426000-memory.dmp upx behavioral2/memory/3948-206-0x00000000022F0000-0x0000000002426000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is240603968.log 079874bb67fb9edbec599dcf067fd7b5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3948 079874bb67fb9edbec599dcf067fd7b5.exe 3948 079874bb67fb9edbec599dcf067fd7b5.exe 3948 079874bb67fb9edbec599dcf067fd7b5.exe 3948 079874bb67fb9edbec599dcf067fd7b5.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3948 079874bb67fb9edbec599dcf067fd7b5.exe Token: SeCreatePagefilePrivilege 3948 079874bb67fb9edbec599dcf067fd7b5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3948 079874bb67fb9edbec599dcf067fd7b5.exe 3948 079874bb67fb9edbec599dcf067fd7b5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\079874bb67fb9edbec599dcf067fd7b5.exe"C:\Users\Admin\AppData\Local\Temp\079874bb67fb9edbec599dcf067fd7b5.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
5KB
MD5298d2d7873ded8ea641abbaaa3f39ed1
SHA1d1a55bf7fa25b927c92d067ac922444a25373865
SHA256fbd0d22b98cb84a259dee238c6fc3ea320f6eb3fcbf1779f93d692c66a3a8f4f
SHA5128cb5caaf596edb3f1b67473267fab7d56c281a37aa7c73c52bb4c8b1b6bab4cddf7ec7ab5d12e2d1ed1d12f104102f4ed185ccc6c8c4b7dd02eca750c71de871
-
Filesize
506B
MD55335f1c12201b5f7cf5f8b4f5692e3d1
SHA113807a10369f7ff9ab3f9aba18135bccb98bec2d
SHA256974cd89e64bdaa85bf36ed2a50af266d245d781a8139f5b45d7c55a0b0841dda
SHA5120d4e54d2ffe96ccf548097f7812e3608537b4dae9687816983fddfb73223c196159cc6a39fcdc000784c79b2ced878efbc7a5b5f6e057973bf25b128124510df
-
Filesize
9KB
MD523bbc4477223fc7a78f0f59498929cb0
SHA1542c2dde42e7ed55fc5ce5e6928d80bf868babb4
SHA2566a8887e1c48799a62ca274d3320da7754c004e9af1071a07e7296a8a7291269a
SHA5129c5cb0979b607ca37e35cee8b490f63773e116fb5536618a28f2b3ea74d21f82ee5fd882134498fb53529fba7363849ea9cf45339e24c2d4e02d9bc76525e5d1
-
Filesize
1KB
MD560e7a3f760637dd125a1150474e7f6bb
SHA146e4b53480dd7b3db532e3511a7ad3b9e99b2f48
SHA256d244e6d623fb3706340ead5491bb61663e5d53a3f7d96d4b613175c875c42184
SHA512d279b197d330c4fe7de5e891b45e60273b603d58c84a502461ba2edf008ed51e6bcfd8768a74ee95bc9558bcbe8294f9f759c188327f7c54b1483d1072b32268
-
Filesize
1KB
MD562d7273f7bfd374313f6fb0155b2e7f7
SHA1dcc738108fa120a4d8ec47ff3e6e71c336c59c16
SHA2568c7b475a063df4c3a3aaa79c26010eddc3259ab91d8ed904a539e17eea8e5caa
SHA51276b316228fefc32424236019e931626611e9b50944960ded528a1e7f6c33b102f9f1326d758411b65fa3c96e99de222324ae3bc85989435da434005245d25a0b
-
Filesize
1KB
MD5cb69f17db666ddf55fd2e7524732903a
SHA1d8ccee322a976dbdc8cab5651e1d0eac0be79028
SHA25682c614299de92d148e414c35fa9727c4c1993de7b26072ea97a5af603ec0605a
SHA51233ce865221108db8f1b17a9a0e5e554bf3769c25662c992b9a3861b13c23c165e0bd621de15fcbc6a4908bc1141b694fd04d6368c608cd1f83ad55d0325e7f06
-
Filesize
2KB
MD574900169442a73b94a452a43bde17248
SHA1b211e593a3bc6559482ddb707399d7b7cf08d331
SHA256c2e7c5e031b4e7bcefa800de4659c8c1ca072ad074d15860583588962beea9b5
SHA512e0a24cf32e8865e9021e161f66f9c275f777ab592e3bb365dd568963aa998612e1dfe9eefdd71e3239ffb43657ef1f86367410192c7769968e9ecfcb6b6ef4c8
-
Filesize
1KB
MD5aa1424f218bf3befbcca3c4c0e42a365
SHA1c91d5dce4ebd543d905026577f8a05dff1d8357e
SHA256e1a823582add59d1406fd36d3f7f86f98873e3201168e542cb49239d6c525ab0
SHA5128ef2ea9613ff50bf028c9ef4611326d61b1cd07d01b89631faa2053449fab9a746e06e59a176dd5cda4f02f77fca8eedbb6e46ae4a78afa416ae8adb7ef0d93b
-
Filesize
1KB
MD561b27f16ef13d3ad95833dd3a932f307
SHA19e0866a07c8309b8f5fb3fbec98531f2ebfbce6f
SHA256be3dee9b5d9f2893607ff916b3c3313987a16092230650dbaeec6e9e36c63ad2
SHA512c3d6a15a826c990bd77c4d2581fe8791fb71346477ee360af50f96a7521e83f5ae89c520af221a737787684eb2b6a714afe9e6d770d9103de4fcc18f767283a0