Analysis
-
max time kernel
162s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
0b0f4774332a528d538ba8f5657b1576.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b0f4774332a528d538ba8f5657b1576.exe
Resource
win10v2004-20231215-en
General
-
Target
0b0f4774332a528d538ba8f5657b1576.exe
-
Size
324KB
-
MD5
0b0f4774332a528d538ba8f5657b1576
-
SHA1
9a084a946021ed0e11466f39d4976fc13f11a723
-
SHA256
e2ef7ae67a756af62c19532fcbcbd3de484ccec60da8b6c7543b0f7bc602c678
-
SHA512
e0b8255b94ae6c6aed523252816e26316f0d66e61d1d17ce0a4f141adbce1025cb117b96742fdc35b0d75b3cad561edf3d5562f651a2a17aac5fbeb91969f32d
-
SSDEEP
6144:d9OLCr50OaSjg6H3qBC1hJI26sQwO0yRJJ5JDVoYKQIDKT3cKamM9p6HprBIvDAy:uLCFUSj7Ha0JI7sbyRJJ5pKLKDymMgBh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1464 fDhCgAh01827.exe -
Executes dropped EXE 1 IoCs
pid Process 1464 fDhCgAh01827.exe -
resource yara_rule behavioral2/memory/2200-1-0x0000000000400000-0x00000000005BD000-memory.dmp upx behavioral2/memory/1464-10-0x0000000000400000-0x00000000005BD000-memory.dmp upx behavioral2/memory/2200-13-0x0000000000400000-0x00000000005BD000-memory.dmp upx behavioral2/memory/1464-14-0x0000000000400000-0x00000000005BD000-memory.dmp upx behavioral2/memory/1464-25-0x0000000000400000-0x00000000005BD000-memory.dmp upx behavioral2/memory/2200-32-0x0000000000400000-0x00000000005BD000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\fDhCgAh01827 = "C:\\ProgramData\\fDhCgAh01827\\fDhCgAh01827.exe" fDhCgAh01827.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2200 0b0f4774332a528d538ba8f5657b1576.exe 2200 0b0f4774332a528d538ba8f5657b1576.exe 2200 0b0f4774332a528d538ba8f5657b1576.exe 2200 0b0f4774332a528d538ba8f5657b1576.exe 1464 fDhCgAh01827.exe 1464 fDhCgAh01827.exe 1464 fDhCgAh01827.exe 1464 fDhCgAh01827.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2200 0b0f4774332a528d538ba8f5657b1576.exe Token: SeDebugPrivilege 1464 fDhCgAh01827.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1464 fDhCgAh01827.exe 1464 fDhCgAh01827.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1464 fDhCgAh01827.exe 1464 fDhCgAh01827.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1464 fDhCgAh01827.exe 1464 fDhCgAh01827.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1464 2200 0b0f4774332a528d538ba8f5657b1576.exe 91 PID 2200 wrote to memory of 1464 2200 0b0f4774332a528d538ba8f5657b1576.exe 91 PID 2200 wrote to memory of 1464 2200 0b0f4774332a528d538ba8f5657b1576.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b0f4774332a528d538ba8f5657b1576.exe"C:\Users\Admin\AppData\Local\Temp\0b0f4774332a528d538ba8f5657b1576.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\ProgramData\fDhCgAh01827\fDhCgAh01827.exe"C:\ProgramData\fDhCgAh01827\fDhCgAh01827.exe" "C:\Users\Admin\AppData\Local\Temp\0b0f4774332a528d538ba8f5657b1576.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
324KB
MD543fd61ba972520bf3e8d50bad85d1277
SHA17ad91cc67c36e35637f9c9983689c190870115cb
SHA256a23a8b4c538db5ac0b430c09677c7694e5b68b198093088a9f310c251a97751d
SHA512b951e0f96a9961be5cc2509b22349c1b31889d90c8c92cb07d3a1ad95cf99b020e8d4a73997a44489ef9a92be135d54b6c38ded72bc1b1b03f2f9040b3784948
-
Filesize
306KB
MD5d9f8bbe942521fa66471e98761eecc32
SHA1b2efa12e4967b356bf352e88d9994252ad83c472
SHA256b641534f2bd32629d78c9381440528ba02396580eedefea610927c4694d00c8e
SHA5126de7b1af49df59b951e92f1d748e6b5ae7d00a2ca3f67a1619bf033274b4ca5ca11f2b147dcbce6cd2b9bf0853314f904175d2a210f4c8939b3e19439f854ebe