Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 04:57
Static task
static1
Behavioral task
behavioral1
Sample
0670adf6d934f2642d33220a1c6fa0d1.exe
Resource
win7-20231215-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
0670adf6d934f2642d33220a1c6fa0d1.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
0670adf6d934f2642d33220a1c6fa0d1.exe
-
Size
23.7MB
-
MD5
0670adf6d934f2642d33220a1c6fa0d1
-
SHA1
d2c12675ee8941071ed08f02f357fe30ca1e3e95
-
SHA256
de5dc23f9794ae3c2cf7ea102a50b3fbc4f1b54229ff87dce56c73a3fb1c1d03
-
SHA512
a487c1aca7cfc20a886edc92614f3287e134377d1cf63b436063666a37225c10311006793729ccba1858eb9f513d367e4a8136fa330fe63e89509ec66fb95e33
-
SSDEEP
393216:uaq/j0SymQc9B+7cwWc8MU3p7T+kZyZG/G7ISHpJBaopSXykI7sgDUjVq:uB/QSTQyB+72xh+2G7dHpo9gYjVq
Score
4/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2316 0670adf6d934f2642d33220a1c6fa0d1.tmp 2812 setup.exe -
Loads dropped DLL 4 IoCs
pid Process 2056 0670adf6d934f2642d33220a1c6fa0d1.exe 2316 0670adf6d934f2642d33220a1c6fa0d1.tmp 2316 0670adf6d934f2642d33220a1c6fa0d1.tmp 2316 0670adf6d934f2642d33220a1c6fa0d1.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2316 0670adf6d934f2642d33220a1c6fa0d1.tmp 2316 0670adf6d934f2642d33220a1c6fa0d1.tmp 2812 setup.exe 2812 setup.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2316 0670adf6d934f2642d33220a1c6fa0d1.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2812 setup.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2316 2056 0670adf6d934f2642d33220a1c6fa0d1.exe 28 PID 2056 wrote to memory of 2316 2056 0670adf6d934f2642d33220a1c6fa0d1.exe 28 PID 2056 wrote to memory of 2316 2056 0670adf6d934f2642d33220a1c6fa0d1.exe 28 PID 2056 wrote to memory of 2316 2056 0670adf6d934f2642d33220a1c6fa0d1.exe 28 PID 2056 wrote to memory of 2316 2056 0670adf6d934f2642d33220a1c6fa0d1.exe 28 PID 2056 wrote to memory of 2316 2056 0670adf6d934f2642d33220a1c6fa0d1.exe 28 PID 2056 wrote to memory of 2316 2056 0670adf6d934f2642d33220a1c6fa0d1.exe 28 PID 2316 wrote to memory of 2812 2316 0670adf6d934f2642d33220a1c6fa0d1.tmp 29 PID 2316 wrote to memory of 2812 2316 0670adf6d934f2642d33220a1c6fa0d1.tmp 29 PID 2316 wrote to memory of 2812 2316 0670adf6d934f2642d33220a1c6fa0d1.tmp 29 PID 2316 wrote to memory of 2812 2316 0670adf6d934f2642d33220a1c6fa0d1.tmp 29 PID 2316 wrote to memory of 2812 2316 0670adf6d934f2642d33220a1c6fa0d1.tmp 29 PID 2316 wrote to memory of 2812 2316 0670adf6d934f2642d33220a1c6fa0d1.tmp 29 PID 2316 wrote to memory of 2812 2316 0670adf6d934f2642d33220a1c6fa0d1.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0670adf6d934f2642d33220a1c6fa0d1.exe"C:\Users\Admin\AppData\Local\Temp\0670adf6d934f2642d33220a1c6fa0d1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\is-BBFG6.tmp\0670adf6d934f2642d33220a1c6fa0d1.tmp"C:\Users\Admin\AppData\Local\Temp\is-BBFG6.tmp\0670adf6d934f2642d33220a1c6fa0d1.tmp" /SL5="$400EE,24104104,139264,C:\Users\Admin\AppData\Local\Temp\0670adf6d934f2642d33220a1c6fa0d1.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\is-MO95P.tmp-dbinst\setup.exe"C:\Users\Admin\AppData\Local\Temp\is-MO95P.tmp-dbinst\setup.exe" "C:\Users\Admin\AppData\Local\Temp\0670adf6d934f2642d33220a1c6fa0d1.exe" /title="Driver Booster 7" /dbver=7.3.0.675 /eula="C:\Users\Admin\AppData\Local\Temp\is-MO95P.tmp-dbinst\EULA.rtf" /showlearnmore /pmtproduct /nochromepmt3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2812
-
-