Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 21:35
Static task
static1
Behavioral task
behavioral1
Sample
3dbefb652fe72ff1db96deb50aa8090d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3dbefb652fe72ff1db96deb50aa8090d.exe
Resource
win10v2004-20231222-en
General
-
Target
3dbefb652fe72ff1db96deb50aa8090d.exe
-
Size
123KB
-
MD5
3dbefb652fe72ff1db96deb50aa8090d
-
SHA1
4f824e8db198c4e46e5d1a47316dfd92d5b94366
-
SHA256
cd185a5ee5c24cd9a733e975b4e257d1f74b927f344daaac80b21075c86ae766
-
SHA512
7e688aeed6beedc5285e036edfdb0a38d5accaad551c8f045ea423245aeea88a0417f5784daf466b3896dc8fe51b607be96b18ebf1ac88095f751d7b67f14893
-
SSDEEP
3072:Hq8f/oic1i9uTAlPQSDwEyWefHEvGdxETCpPJ:K8f/U1iF/sUGdxET
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2140 3dbefb652fe72ff1db96deb50aa8090d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2140 wrote to memory of 3020 2140 3dbefb652fe72ff1db96deb50aa8090d.exe 28 PID 2140 wrote to memory of 3020 2140 3dbefb652fe72ff1db96deb50aa8090d.exe 28 PID 2140 wrote to memory of 3020 2140 3dbefb652fe72ff1db96deb50aa8090d.exe 28 PID 2140 wrote to memory of 3020 2140 3dbefb652fe72ff1db96deb50aa8090d.exe 28 PID 3020 wrote to memory of 2744 3020 cmd.exe 30 PID 3020 wrote to memory of 2744 3020 cmd.exe 30 PID 3020 wrote to memory of 2744 3020 cmd.exe 30 PID 3020 wrote to memory of 2744 3020 cmd.exe 30 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2744 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dbefb652fe72ff1db96deb50aa8090d.exe"C:\Users\Admin\AppData\Local\Temp\3dbefb652fe72ff1db96deb50aa8090d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\lwhA417.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\3dbefb652fe72ff1db96deb50aa8090d.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\3dbefb652fe72ff1db96deb50aa8090d.exe"3⤵
- Views/modifies file attributes
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57B
MD5fd647c2d492546ee0b16d1b2df53dbeb
SHA1c9b65b3ce20af7f4ccbf420154e2af5cf981d970
SHA256ae38c2205332310e813bab68dc0e858314537c78d36084c4db22e906d0c9b997
SHA51263b7a4e91733cf267c54087133bac9cc469cb1262fc2697c8ae8c69cb737b7ad4ce62eba7ab46c013771f2776937a9694858871545489ccec62d08c36977e1f5