Analysis
-
max time kernel
161s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
126e53b9def478f77aa4d37f79c7c1c9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
126e53b9def478f77aa4d37f79c7c1c9.exe
Resource
win10v2004-20231222-en
General
-
Target
126e53b9def478f77aa4d37f79c7c1c9.exe
-
Size
38KB
-
MD5
126e53b9def478f77aa4d37f79c7c1c9
-
SHA1
039626c132cb9fca3144e1bdede4149f06811204
-
SHA256
c1a5f287b9a35a1d3ec5c9488557f30936c3548a92751133c58797cc15661497
-
SHA512
88da7de5b77e3107300de9ce22857b192550b47f6baf64aa0036b645393a1ed0e8bba6ce83e4935e5a588a9e26c2087f6d72a108f73274deaf6612e05d3bdd23
-
SSDEEP
768:w3vOvlCWW6VgEDCVD+UedClj6mQLHi7dz2dxfNVtIVRBS:QvZaJu3eUC62dzVuVRBS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2772 E.exe 2808 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mslg.blf svchost.exe File opened for modification C:\Windows\SysWOW64\mslg.blf svchost.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\svchost.exe E.exe File created C:\Windows\svchost.exe E.exe File opened for modification C:\Windows\svchost.exe svchost.exe File created C:\Windows\svchost.exe svchost.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 E.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString E.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2808 svchost.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2772 E.exe Token: SeSecurityPrivilege 2772 E.exe Token: SeTakeOwnershipPrivilege 2772 E.exe Token: SeLoadDriverPrivilege 2772 E.exe Token: SeSystemProfilePrivilege 2772 E.exe Token: SeSystemtimePrivilege 2772 E.exe Token: SeProfSingleProcessPrivilege 2772 E.exe Token: SeIncBasePriorityPrivilege 2772 E.exe Token: SeCreatePagefilePrivilege 2772 E.exe Token: SeBackupPrivilege 2772 E.exe Token: SeRestorePrivilege 2772 E.exe Token: SeShutdownPrivilege 2772 E.exe Token: SeDebugPrivilege 2772 E.exe Token: SeSystemEnvironmentPrivilege 2772 E.exe Token: SeRemoteShutdownPrivilege 2772 E.exe Token: SeUndockPrivilege 2772 E.exe Token: SeManageVolumePrivilege 2772 E.exe Token: 33 2772 E.exe Token: 34 2772 E.exe Token: 35 2772 E.exe Token: SeIncreaseQuotaPrivilege 2808 svchost.exe Token: SeSecurityPrivilege 2808 svchost.exe Token: SeTakeOwnershipPrivilege 2808 svchost.exe Token: SeLoadDriverPrivilege 2808 svchost.exe Token: SeSystemProfilePrivilege 2808 svchost.exe Token: SeSystemtimePrivilege 2808 svchost.exe Token: SeProfSingleProcessPrivilege 2808 svchost.exe Token: SeIncBasePriorityPrivilege 2808 svchost.exe Token: SeCreatePagefilePrivilege 2808 svchost.exe Token: SeBackupPrivilege 2808 svchost.exe Token: SeRestorePrivilege 2808 svchost.exe Token: SeShutdownPrivilege 2808 svchost.exe Token: SeDebugPrivilege 2808 svchost.exe Token: SeSystemEnvironmentPrivilege 2808 svchost.exe Token: SeRemoteShutdownPrivilege 2808 svchost.exe Token: SeUndockPrivilege 2808 svchost.exe Token: SeManageVolumePrivilege 2808 svchost.exe Token: 33 2808 svchost.exe Token: 34 2808 svchost.exe Token: 35 2808 svchost.exe Token: 33 2808 svchost.exe Token: SeIncBasePriorityPrivilege 2808 svchost.exe Token: 33 2808 svchost.exe Token: SeIncBasePriorityPrivilege 2808 svchost.exe Token: 33 2808 svchost.exe Token: SeIncBasePriorityPrivilege 2808 svchost.exe Token: 33 2808 svchost.exe Token: SeIncBasePriorityPrivilege 2808 svchost.exe Token: 33 2808 svchost.exe Token: SeIncBasePriorityPrivilege 2808 svchost.exe Token: 33 2808 svchost.exe Token: SeIncBasePriorityPrivilege 2808 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2772 2740 126e53b9def478f77aa4d37f79c7c1c9.exe 30 PID 2740 wrote to memory of 2772 2740 126e53b9def478f77aa4d37f79c7c1c9.exe 30 PID 2740 wrote to memory of 2772 2740 126e53b9def478f77aa4d37f79c7c1c9.exe 30 PID 2740 wrote to memory of 2772 2740 126e53b9def478f77aa4d37f79c7c1c9.exe 30 PID 2772 wrote to memory of 2808 2772 E.exe 31 PID 2772 wrote to memory of 2808 2772 E.exe 31 PID 2772 wrote to memory of 2808 2772 E.exe 31 PID 2772 wrote to memory of 2808 2772 E.exe 31 PID 2772 wrote to memory of 2692 2772 E.exe 33 PID 2772 wrote to memory of 2692 2772 E.exe 33 PID 2772 wrote to memory of 2692 2772 E.exe 33 PID 2772 wrote to memory of 2692 2772 E.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\126e53b9def478f77aa4d37f79c7c1c9.exe"C:\Users\Admin\AppData\Local\Temp\126e53b9def478f77aa4d37f79c7c1c9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\E.exe"\E.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\svchost.exeC:\Windows\svchost.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\#3#.bat3⤵PID:2692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD550139bfb82523a6726e07ebc019306d3
SHA1825074995d3e532b3786acf21b7d044cda21140c
SHA256f64a28136781a67cc6708f828d1db90b3e9fb10e7a4984e23eefadfbf908432e
SHA5129093e79f7d0def5bb2d016ce504efae4e5a7262a5ca6ef5b7861b1a60d226a02b77f46e042cee8dffd506376026a8c48025487a5b1ca9451ff4168c90bd1eafa
-
Filesize
56B
MD54b6438a7762f1688e88d9bbf770f2c66
SHA1a083bee7ee1b0b7e1e72064142947c6c1010972b
SHA256168f5f530d8f1abc9e1f1bc7510022361ae0115c0c2af3d5adebc4efc58f480a
SHA512c28811248f93d7c1d80586945f695cb649ee0f86cdc46d8f66e9c15f3d0627cabd896941fd1da59dbb4a9c9e91839d0115d506b75cdde3c7205474c829193b9b