Analysis
-
max time kernel
160s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
1253d0e7737bbd09dc4b842466e7cb5b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1253d0e7737bbd09dc4b842466e7cb5b.exe
Resource
win10v2004-20231215-en
General
-
Target
1253d0e7737bbd09dc4b842466e7cb5b.exe
-
Size
459KB
-
MD5
1253d0e7737bbd09dc4b842466e7cb5b
-
SHA1
3b110cdc32f9e146a91f1a500bff84fa9c333a13
-
SHA256
13ae9c0fa914893d99af9e3e0cf7e0bc2dee46f94ada204a28fb38518802bab4
-
SHA512
5e109450a96391a7a3cb37c74d4cefc3c40c0fc97be015f735b035826c8969e97d7b100843205bfda1a5314e590b17d6bc11ec237920847a338c096b665175e8
-
SSDEEP
6144:RXP2VguYIgrGRq6tHPbhpDEOb59H7wsh2iESrhtiJg3BGVP0SLDFEpojsJPYf:JkgrL6tAOb7H7jcSrDiWGVMUEpojsJ0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4748 zsiilitzcpioq.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4748 zsiilitzcpioq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4748 zsiilitzcpioq.exe 4748 zsiilitzcpioq.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2392 wrote to memory of 4748 2392 1253d0e7737bbd09dc4b842466e7cb5b.exe 87 PID 2392 wrote to memory of 4748 2392 1253d0e7737bbd09dc4b842466e7cb5b.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1253d0e7737bbd09dc4b842466e7cb5b.exe"C:\Users\Admin\AppData\Local\Temp\1253d0e7737bbd09dc4b842466e7cb5b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\mgisajvngqihim\zsiilitzcpioq.exe"C:\Users\Admin\AppData\Local\Temp\mgisajvngqihim\zsiilitzcpioq.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4748
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
459KB
MD51253d0e7737bbd09dc4b842466e7cb5b
SHA13b110cdc32f9e146a91f1a500bff84fa9c333a13
SHA25613ae9c0fa914893d99af9e3e0cf7e0bc2dee46f94ada204a28fb38518802bab4
SHA5125e109450a96391a7a3cb37c74d4cefc3c40c0fc97be015f735b035826c8969e97d7b100843205bfda1a5314e590b17d6bc11ec237920847a338c096b665175e8
-
Filesize
7KB
MD5ed9f29dcad3d7177bb3a022a6148dbe9
SHA1c13ff13952181c5aa5137c6bc1cddb924abacd33
SHA256d29936029335e8eddb46e1c1f0b34ab469e78c7f3c4cf807264d50291726ef14
SHA51221508b7a1ebff3aa167b35bebb8c6ca2e32089443c6a6fbd9456720038a6b94a891491c436cba1658e8c40022749cc11b48da69464b2a90b57ba87989bb02198