Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 18:14
Static task
static1
Behavioral task
behavioral1
Sample
0af608e9116ca465022a75f3c04f00ee.exe
Resource
win7-20231215-en
General
-
Target
0af608e9116ca465022a75f3c04f00ee.exe
-
Size
1.6MB
-
MD5
0af608e9116ca465022a75f3c04f00ee
-
SHA1
998f2d298569c5618466f792ed03f77fee22470f
-
SHA256
63b44c6c032a64c55d978ff64a58b8529402b55f678109727702a91421e31d21
-
SHA512
86594c204ad49b6ea961e1a9af64c9824b3031dfef5a31244d7b21c86f15731de37ce5c2ab3ca13e06dcbd324f951daf074e1d2bee725ee461641dd3e2f689b0
-
SSDEEP
24576:eG5drt5hlq2r+kkNNVJGoBcf5FMt36c7nSgMit65Eq/318GpGTv/JZl6Ez:lDhlq22gFcOXit6SmjkF6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2580 agaga.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2580 agaga.exe Token: SeSecurityPrivilege 2580 agaga.exe Token: SeTakeOwnershipPrivilege 2580 agaga.exe Token: SeLoadDriverPrivilege 2580 agaga.exe Token: SeSystemProfilePrivilege 2580 agaga.exe Token: SeSystemtimePrivilege 2580 agaga.exe Token: SeProfSingleProcessPrivilege 2580 agaga.exe Token: SeIncBasePriorityPrivilege 2580 agaga.exe Token: SeCreatePagefilePrivilege 2580 agaga.exe Token: SeBackupPrivilege 2580 agaga.exe Token: SeRestorePrivilege 2580 agaga.exe Token: SeShutdownPrivilege 2580 agaga.exe Token: SeDebugPrivilege 2580 agaga.exe Token: SeSystemEnvironmentPrivilege 2580 agaga.exe Token: SeChangeNotifyPrivilege 2580 agaga.exe Token: SeRemoteShutdownPrivilege 2580 agaga.exe Token: SeUndockPrivilege 2580 agaga.exe Token: SeManageVolumePrivilege 2580 agaga.exe Token: SeImpersonatePrivilege 2580 agaga.exe Token: SeCreateGlobalPrivilege 2580 agaga.exe Token: 33 2580 agaga.exe Token: 34 2580 agaga.exe Token: 35 2580 agaga.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2580 agaga.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2580 2856 0af608e9116ca465022a75f3c04f00ee.exe 29 PID 2856 wrote to memory of 2580 2856 0af608e9116ca465022a75f3c04f00ee.exe 29 PID 2856 wrote to memory of 2580 2856 0af608e9116ca465022a75f3c04f00ee.exe 29 PID 2856 wrote to memory of 2580 2856 0af608e9116ca465022a75f3c04f00ee.exe 29 PID 2580 wrote to memory of 2596 2580 agaga.exe 30 PID 2580 wrote to memory of 2596 2580 agaga.exe 30 PID 2580 wrote to memory of 2596 2580 agaga.exe 30 PID 2580 wrote to memory of 2596 2580 agaga.exe 30 PID 2580 wrote to memory of 2496 2580 agaga.exe 31 PID 2580 wrote to memory of 2496 2580 agaga.exe 31 PID 2580 wrote to memory of 2496 2580 agaga.exe 31 PID 2580 wrote to memory of 2496 2580 agaga.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0af608e9116ca465022a75f3c04f00ee.exe"C:\Users\Admin\AppData\Local\Temp\0af608e9116ca465022a75f3c04f00ee.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\agaga.exe"C:\Users\Admin\AppData\Local\Temp\agaga.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵PID:2596
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:2496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
646KB
MD58b23a5cb329a7e10eef883049b2904ec
SHA13545db57f4a3d5f5e8247b24b1bdbc2d5c2c26c8
SHA256cbb308fdb457b960dba0473241173b6b0df8e2d53e4e049469581f59d6ef20cf
SHA512db2feba02295a77d3acf583b10431313fb7d24e631459b65de93d76b9f80a50349965d5819106dfd739f272b4a5d6397735e00783ed47b2f7dadf0a4a2772a6c