Analysis

  • max time kernel
    161s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 21:10

General

  • Target

    126e53b9def478f77aa4d37f79c7c1c9.exe

  • Size

    38KB

  • MD5

    126e53b9def478f77aa4d37f79c7c1c9

  • SHA1

    039626c132cb9fca3144e1bdede4149f06811204

  • SHA256

    c1a5f287b9a35a1d3ec5c9488557f30936c3548a92751133c58797cc15661497

  • SHA512

    88da7de5b77e3107300de9ce22857b192550b47f6baf64aa0036b645393a1ed0e8bba6ce83e4935e5a588a9e26c2087f6d72a108f73274deaf6612e05d3bdd23

  • SSDEEP

    768:w3vOvlCWW6VgEDCVD+UedClj6mQLHi7dz2dxfNVtIVRBS:QvZaJu3eUC62dzVuVRBS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 52 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\126e53b9def478f77aa4d37f79c7c1c9.exe
    "C:\Users\Admin\AppData\Local\Temp\126e53b9def478f77aa4d37f79c7c1c9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\E.exe
      "\E.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\svchost.exe
        C:\Windows\svchost.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks processor information in registry
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:2808
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\#3#.bat
        3⤵
          PID:2692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\E.exe

      Filesize

      67KB

      MD5

      50139bfb82523a6726e07ebc019306d3

      SHA1

      825074995d3e532b3786acf21b7d044cda21140c

      SHA256

      f64a28136781a67cc6708f828d1db90b3e9fb10e7a4984e23eefadfbf908432e

      SHA512

      9093e79f7d0def5bb2d016ce504efae4e5a7262a5ca6ef5b7861b1a60d226a02b77f46e042cee8dffd506376026a8c48025487a5b1ca9451ff4168c90bd1eafa

    • C:\Users\Admin\AppData\Local\Temp\#3#.bat

      Filesize

      56B

      MD5

      4b6438a7762f1688e88d9bbf770f2c66

      SHA1

      a083bee7ee1b0b7e1e72064142947c6c1010972b

      SHA256

      168f5f530d8f1abc9e1f1bc7510022361ae0115c0c2af3d5adebc4efc58f480a

      SHA512

      c28811248f93d7c1d80586945f695cb649ee0f86cdc46d8f66e9c15f3d0627cabd896941fd1da59dbb4a9c9e91839d0115d506b75cdde3c7205474c829193b9b

    • memory/2740-9-0x0000000000320000-0x000000000033A000-memory.dmp

      Filesize

      104KB

    • memory/2740-5-0x0000000000320000-0x000000000033A000-memory.dmp

      Filesize

      104KB

    • memory/2740-35-0x0000000000400000-0x0000000000406000-memory.dmp

      Filesize

      24KB

    • memory/2772-25-0x0000000000220000-0x000000000023A000-memory.dmp

      Filesize

      104KB

    • memory/2772-27-0x0000000000400000-0x0000000000419600-memory.dmp

      Filesize

      101KB

    • memory/2772-28-0x0000000000220000-0x000000000023A000-memory.dmp

      Filesize

      104KB

    • memory/2772-7-0x0000000000400000-0x0000000000419600-memory.dmp

      Filesize

      101KB

    • memory/2808-29-0x0000000000400000-0x0000000000419600-memory.dmp

      Filesize

      101KB

    • memory/2808-37-0x0000000000400000-0x0000000000419600-memory.dmp

      Filesize

      101KB

    • memory/2808-39-0x0000000000400000-0x0000000000419600-memory.dmp

      Filesize

      101KB

    • memory/2808-42-0x0000000000400000-0x0000000000419600-memory.dmp

      Filesize

      101KB

    • memory/2808-45-0x0000000000400000-0x0000000000419600-memory.dmp

      Filesize

      101KB

    • memory/2808-48-0x0000000000400000-0x0000000000419600-memory.dmp

      Filesize

      101KB