Analysis
-
max time kernel
107s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 06:05
Static task
static1
Behavioral task
behavioral1
Sample
0a484835e9ede7334f3f67966d5abd26.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a484835e9ede7334f3f67966d5abd26.exe
Resource
win10v2004-20231222-en
General
-
Target
0a484835e9ede7334f3f67966d5abd26.exe
-
Size
742KB
-
MD5
0a484835e9ede7334f3f67966d5abd26
-
SHA1
be5df906bcb2f42bb1ca8c7a5708e4a0e3573676
-
SHA256
7bfdab4a9b64d235b81bc868f6056e488319c0c14f02d3c7c3fd0e9b5d83c053
-
SHA512
81bc316aa31d56eb8622848256ed1275babaa169349415b8284e712c45e9eca98a30cd49b44696b7b06840853d534d33c97d6035720d4a581c246f02c45fb098
-
SSDEEP
12288:UFVKeWH/24s9igpM0h2Tm5PCkeEA1c2obY73uQMGL4r:neWH/bs0gq0UFk+ocTzm
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1044 hello.exe 2684 EntSver.exe 1608 hello.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a484835e9ede7334f3f67966d5abd26.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\EntSver.exe hello.exe File opened for modification C:\Windows\EntSver.exe hello.exe File created C:\Windows\GUOCYOKl.BAT hello.exe File opened for modification C:\Windows\EntSver.exe hello.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1044 hello.exe Token: SeDebugPrivilege 2684 EntSver.exe Token: SeDebugPrivilege 1608 hello.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 EntSver.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1044 2240 0a484835e9ede7334f3f67966d5abd26.exe 87 PID 2240 wrote to memory of 1044 2240 0a484835e9ede7334f3f67966d5abd26.exe 87 PID 2240 wrote to memory of 1044 2240 0a484835e9ede7334f3f67966d5abd26.exe 87 PID 2684 wrote to memory of 3084 2684 EntSver.exe 91 PID 2684 wrote to memory of 3084 2684 EntSver.exe 91 PID 1044 wrote to memory of 1316 1044 hello.exe 95 PID 1044 wrote to memory of 1316 1044 hello.exe 95 PID 1044 wrote to memory of 1316 1044 hello.exe 95 PID 2240 wrote to memory of 1608 2240 0a484835e9ede7334f3f67966d5abd26.exe 94 PID 2240 wrote to memory of 1608 2240 0a484835e9ede7334f3f67966d5abd26.exe 94 PID 2240 wrote to memory of 1608 2240 0a484835e9ede7334f3f67966d5abd26.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a484835e9ede7334f3f67966d5abd26.exe"C:\Users\Admin\AppData\Local\Temp\0a484835e9ede7334f3f67966d5abd26.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hello.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hello.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\GUOCYOKl.BAT3⤵PID:1316
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hello.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hello.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"1⤵PID:3084
-
C:\Windows\EntSver.exeC:\Windows\EntSver.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD59419975d520d1787b420b1076511bc3a
SHA158de806c239df4596799305bc55cebc0c957dc2f
SHA256a4ee5cdd9d58fcf8ced2acb8a1aa92b6e5f894876432f3daf9f30df676c867cd
SHA512b054507c5f2109f29129b55d70e95d69f4dfeeb54d7946dbfb8e853995678628a65cd99ebd980d0974016db41a7e7e38b58776e0db14bc550a0e32b6d97f5c7a
-
Filesize
87KB
MD51d663e07dcc68e742f3d36a20b879a0c
SHA19db2dbf3878929c0fd78663ed3e54a0b279356c4
SHA25654b33a90efd7a65d7b00ad76391c75ac253f945b14d83abe16aa0c4eaa9ba7cc
SHA512b17dd0794370006456b3b0fc6921fb68c799887cfbbc11c34e022f038a67458e6d37d1804a910966c8fcde04f9b56a14ae06aca42924a8a33046febb1f726d8c
-
Filesize
116KB
MD5b5efca148ea723f1b333d496ee40ddc1
SHA19832a68e414e4a6f1d758829f624c5afd3b941d7
SHA2566851548162687af66e698f9e315e156daf9b8ffe27391a87f3e6405949d4fc38
SHA51260ab22b3bec914d46647345cb4a41b5513c8619f660bdbf93b241750431304a55d682338c2d6119b9e27cd4a4bef9e5a0f44184509fc70cb2f6d49c63d0ab170
-
Filesize
495KB
MD56809867490c5e72804b2c87050224131
SHA187347e5fd135ea4a401d4a07cbee1117dd8f34fc
SHA256037b75d659bdbcc49c319be346a43ca232af1e26a8bd7d6b1b0b2f78b9ee465d
SHA5123029ab97d8f251a721df2068111303f4db925f29dc8ab7825f01d8f8b058cd66e72acadcd89150431546964e7293cf8ce672eeadc25e44ccbe0a53e0d27227d2
-
Filesize
335KB
MD51a7e9a8f81e6e973f0b008a2c40a0766
SHA13d0a82b6d43dfdfee89bdced74a3e65b7ec9fc29
SHA256254a51e9c98a355d97cd5150b53833cfe8a0b7e9beb4746a17ae418daadd0d79
SHA51296572e73886e65b194cd010e6c80a9836517d12b82e16f67f61cba7290485eb3cd0ad0382431ed53d92d1d2c8fbf12193f4a5e42f26b204a9f0331d615e4e546
-
Filesize
158B
MD5fd9a48b3dbdc1c2a9e4bf05e83ee810a
SHA1e4e016ceaa3f06cbee89f4b6f29205a8dda0c0ff
SHA256d4b5ea9ef731308584b41d502c61a4c5367fca3c228cb2a413662d4d540c99c7
SHA5120cd2168df626ea4e4828dd4ae38571d838fa0ae15f9cf133b08646f872e233ff58ca170a3d760f03e115e76b06b73ef9d71effe0376f4c219d061bedd977e45d