Analysis
-
max time kernel
149s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 17:43
Static task
static1
Behavioral task
behavioral1
Sample
091e2e2e239281991d33e5094029ca61.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
091e2e2e239281991d33e5094029ca61.exe
Resource
win10v2004-20231215-en
General
-
Target
091e2e2e239281991d33e5094029ca61.exe
-
Size
319KB
-
MD5
091e2e2e239281991d33e5094029ca61
-
SHA1
b7404706b291382d67f568df667ce0b7feeca17c
-
SHA256
9d72b12fb708e82a967394e594acc433f84950a1bb5a544999b6a04a5570c945
-
SHA512
fe4fe11c6efcc61c680b11b45dae59eecfb858098b4b0555f9681811b00437c37688d99f0f6bc7ced34cf28fbf715ebe15f15f688bb6852e9f91bc7278430879
-
SSDEEP
6144:T46E7LabA3oWuWJxEMZzry91JK3yNTLyBZA2VECnZnpE8D6SxNb/rl:T4D7Lab6nbJ9a3JYyNCBZZZpEHwt/J
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1504 ttsn.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\ttsn.exe 091e2e2e239281991d33e5094029ca61.exe File opened for modification C:\Windows\ttsn.exe 091e2e2e239281991d33e5094029ca61.exe File created C:\Windows\DELME.BAT 091e2e2e239281991d33e5094029ca61.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2404 091e2e2e239281991d33e5094029ca61.exe Token: SeDebugPrivilege 1504 ttsn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 ttsn.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1504 wrote to memory of 4000 1504 ttsn.exe 52 PID 1504 wrote to memory of 4000 1504 ttsn.exe 52 PID 2404 wrote to memory of 1104 2404 091e2e2e239281991d33e5094029ca61.exe 94 PID 2404 wrote to memory of 1104 2404 091e2e2e239281991d33e5094029ca61.exe 94 PID 2404 wrote to memory of 1104 2404 091e2e2e239281991d33e5094029ca61.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\091e2e2e239281991d33e5094029ca61.exe"C:\Users\Admin\AppData\Local\Temp\091e2e2e239281991d33e5094029ca61.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\DELME.BAT2⤵PID:1104
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"1⤵PID:4000
-
C:\Windows\ttsn.exeC:\Windows\ttsn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1504
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD552cac4903d58c33c947ba6489637ccad
SHA17ddc6ec742dba57387549a8e92ebdd64969a0501
SHA2563b550d7a4de58f66e2497530eb8e54dbf027fefc4f7186bc14459a1331cdaadd
SHA5127c3a41d3d5c9092fe646eb9408ba2ee6d41898632bb99423364a2c684255e07d1661edc9d7196f93f0823c38d18e28512c469d170def9fb05a4d4020b4223aea
-
Filesize
51KB
MD5cd7d18b2bfe0be72e1ed56b6a12274f1
SHA1f74cb11af5acc722b7205717fec9336010ba9e64
SHA256975f99c7b93d35dc11ff3dbff4644bab4b88dc80636a884413fd5b67a16ca25d
SHA512284b601f6a7176f28a6b6d634babf14fc6450ee35e6d2187951db1128b17d526b5b5c5019e51116235b6d05064b39c1072e9fb899a54a5aa8bfc74849007dffe
-
Filesize
47KB
MD5bdd8e22cb03db5588bbcffa8988a2f04
SHA15d273a1ed6bf9ab523e5a329fa01c00a72b174fe
SHA2565d1c0755b16ff838514f3040686b6c2c25df704e0ba00c4539f03c1547f51003
SHA51270e577fa7d73413db34289feb0b954bd700108807934c9338f3fe45920755eda677e99a13d540d0e63b24536249ae607e674e428d9ab3b6ad6ada1fe9dff89cc