Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
0c8cbf9615eb6474b6e6e41855c79471.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c8cbf9615eb6474b6e6e41855c79471.exe
Resource
win10v2004-20231215-en
General
-
Target
0c8cbf9615eb6474b6e6e41855c79471.exe
-
Size
608KB
-
MD5
0c8cbf9615eb6474b6e6e41855c79471
-
SHA1
77d74ba97f85ab6bcad4aa9c6903feabf70800a1
-
SHA256
79f6be6f4baba3ee46d4ff04c887641bc85a12a216c7da809093c89d9cafe247
-
SHA512
459f5a939a3998ab61b80192a47eb2f607a80557130d982060d413242c7edcc7a72ca104ef8c7f86bab2fc4fd82922ae9caa66473e8d5191c29d28c919c7f261
-
SSDEEP
12288:yq5HmlhBno1zmdp5tKTcGDNsWXBqzfYuATpU/rLXirvXbR+CXon:N5Gb61zy5AcuOCixAAC6
Malware Config
Signatures
-
Executes dropped EXE 19 IoCs
pid Process 2360 server.exe 2784 ka.exe 2652 ka.exe 2888 ka.exe 364 ka.exe 1100 ka.exe 1768 ka.exe 2364 ka.exe 2140 ka.exe 1816 ka.exe 1160 ka.exe 2196 ka.exe 1560 ka.exe 2940 ka.exe 1084 ka.exe 2560 ka.exe 3004 ka.exe 1212 ka.exe 1500 ka.exe -
Loads dropped DLL 4 IoCs
pid Process 2656 0c8cbf9615eb6474b6e6e41855c79471.exe 2656 0c8cbf9615eb6474b6e6e41855c79471.exe 2360 server.exe 2360 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" server.exe -
Suspicious use of SetThreadContext 17 IoCs
description pid Process procid_target PID 2784 set thread context of 2652 2784 ka.exe 31 PID 2652 set thread context of 2888 2652 ka.exe 32 PID 2888 set thread context of 364 2888 ka.exe 33 PID 364 set thread context of 1100 364 ka.exe 34 PID 1100 set thread context of 1768 1100 ka.exe 35 PID 1768 set thread context of 2364 1768 ka.exe 36 PID 2364 set thread context of 2140 2364 ka.exe 37 PID 2140 set thread context of 1816 2140 ka.exe 38 PID 1816 set thread context of 1160 1816 ka.exe 39 PID 1160 set thread context of 2196 1160 ka.exe 40 PID 2196 set thread context of 1560 2196 ka.exe 41 PID 1560 set thread context of 2940 1560 ka.exe 42 PID 2940 set thread context of 1084 2940 ka.exe 43 PID 1084 set thread context of 2560 1084 ka.exe 44 PID 2560 set thread context of 3004 2560 ka.exe 45 PID 3004 set thread context of 1212 3004 ka.exe 46 PID 1212 set thread context of 1500 1212 ka.exe 47 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3048 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3048 vlc.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 2784 ka.exe Token: SeDebugPrivilege 2652 ka.exe Token: SeDebugPrivilege 2888 ka.exe Token: 33 3048 vlc.exe Token: SeIncBasePriorityPrivilege 3048 vlc.exe Token: SeDebugPrivilege 364 ka.exe Token: SeDebugPrivilege 1100 ka.exe Token: SeDebugPrivilege 1768 ka.exe Token: SeDebugPrivilege 2364 ka.exe Token: SeDebugPrivilege 2140 ka.exe Token: SeDebugPrivilege 1816 ka.exe Token: SeDebugPrivilege 1160 ka.exe Token: SeDebugPrivilege 2196 ka.exe Token: SeDebugPrivilege 1560 ka.exe Token: SeDebugPrivilege 2940 ka.exe Token: SeDebugPrivilege 1084 ka.exe Token: SeDebugPrivilege 2560 ka.exe Token: SeDebugPrivilege 3004 ka.exe Token: SeDebugPrivilege 1212 ka.exe Token: SeDebugPrivilege 1500 ka.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe 3048 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3048 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 3048 2656 0c8cbf9615eb6474b6e6e41855c79471.exe 28 PID 2656 wrote to memory of 3048 2656 0c8cbf9615eb6474b6e6e41855c79471.exe 28 PID 2656 wrote to memory of 3048 2656 0c8cbf9615eb6474b6e6e41855c79471.exe 28 PID 2656 wrote to memory of 3048 2656 0c8cbf9615eb6474b6e6e41855c79471.exe 28 PID 2656 wrote to memory of 2360 2656 0c8cbf9615eb6474b6e6e41855c79471.exe 29 PID 2656 wrote to memory of 2360 2656 0c8cbf9615eb6474b6e6e41855c79471.exe 29 PID 2656 wrote to memory of 2360 2656 0c8cbf9615eb6474b6e6e41855c79471.exe 29 PID 2656 wrote to memory of 2360 2656 0c8cbf9615eb6474b6e6e41855c79471.exe 29 PID 2360 wrote to memory of 2784 2360 server.exe 30 PID 2360 wrote to memory of 2784 2360 server.exe 30 PID 2360 wrote to memory of 2784 2360 server.exe 30 PID 2360 wrote to memory of 2784 2360 server.exe 30 PID 2784 wrote to memory of 2652 2784 ka.exe 31 PID 2784 wrote to memory of 2652 2784 ka.exe 31 PID 2784 wrote to memory of 2652 2784 ka.exe 31 PID 2784 wrote to memory of 2652 2784 ka.exe 31 PID 2784 wrote to memory of 2652 2784 ka.exe 31 PID 2784 wrote to memory of 2652 2784 ka.exe 31 PID 2652 wrote to memory of 2888 2652 ka.exe 32 PID 2652 wrote to memory of 2888 2652 ka.exe 32 PID 2652 wrote to memory of 2888 2652 ka.exe 32 PID 2652 wrote to memory of 2888 2652 ka.exe 32 PID 2652 wrote to memory of 2888 2652 ka.exe 32 PID 2652 wrote to memory of 2888 2652 ka.exe 32 PID 2888 wrote to memory of 364 2888 ka.exe 33 PID 2888 wrote to memory of 364 2888 ka.exe 33 PID 2888 wrote to memory of 364 2888 ka.exe 33 PID 2888 wrote to memory of 364 2888 ka.exe 33 PID 2888 wrote to memory of 364 2888 ka.exe 33 PID 2888 wrote to memory of 364 2888 ka.exe 33 PID 364 wrote to memory of 1100 364 ka.exe 34 PID 364 wrote to memory of 1100 364 ka.exe 34 PID 364 wrote to memory of 1100 364 ka.exe 34 PID 364 wrote to memory of 1100 364 ka.exe 34 PID 364 wrote to memory of 1100 364 ka.exe 34 PID 364 wrote to memory of 1100 364 ka.exe 34 PID 1100 wrote to memory of 1768 1100 ka.exe 35 PID 1100 wrote to memory of 1768 1100 ka.exe 35 PID 1100 wrote to memory of 1768 1100 ka.exe 35 PID 1100 wrote to memory of 1768 1100 ka.exe 35 PID 1100 wrote to memory of 1768 1100 ka.exe 35 PID 1100 wrote to memory of 1768 1100 ka.exe 35 PID 1768 wrote to memory of 2364 1768 ka.exe 36 PID 1768 wrote to memory of 2364 1768 ka.exe 36 PID 1768 wrote to memory of 2364 1768 ka.exe 36 PID 1768 wrote to memory of 2364 1768 ka.exe 36 PID 1768 wrote to memory of 2364 1768 ka.exe 36 PID 1768 wrote to memory of 2364 1768 ka.exe 36 PID 2364 wrote to memory of 2140 2364 ka.exe 37 PID 2364 wrote to memory of 2140 2364 ka.exe 37 PID 2364 wrote to memory of 2140 2364 ka.exe 37 PID 2364 wrote to memory of 2140 2364 ka.exe 37 PID 2364 wrote to memory of 2140 2364 ka.exe 37 PID 2364 wrote to memory of 2140 2364 ka.exe 37 PID 2140 wrote to memory of 1816 2140 ka.exe 38 PID 2140 wrote to memory of 1816 2140 ka.exe 38 PID 2140 wrote to memory of 1816 2140 ka.exe 38 PID 2140 wrote to memory of 1816 2140 ka.exe 38 PID 2140 wrote to memory of 1816 2140 ka.exe 38 PID 2140 wrote to memory of 1816 2140 ka.exe 38 PID 1816 wrote to memory of 1160 1816 ka.exe 39 PID 1816 wrote to memory of 1160 1816 ka.exe 39 PID 1816 wrote to memory of 1160 1816 ka.exe 39 PID 1816 wrote to memory of 1160 1816 ka.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c8cbf9615eb6474b6e6e41855c79471.exe"C:\Users\Admin\AppData\Local\Temp\0c8cbf9615eb6474b6e6e41855c79471.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Facebook +183.mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe14⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe16⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe18⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ka.exe21⤵PID:2632
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
359KB
MD514ff0c63f931f1dcd4e2389fc6057b1a
SHA113042bdd6aeec0b9d867dcbfc1a6cc243fc4b893
SHA256aeda391c44f9ba1e6111756404d16fe1c926b877d03769208a6f3133cd6a56ae
SHA512af6a8ceb4103ebb2d9b3f025cc5e36addd5e0f78ac5cf868b1b5e4ac98831931a6ae45108ab9c503d06647c7ef87e38d4256b428f6a614089dd14927d0d72d10
-
Filesize
64KB
MD5f3dcd70c81614573e59c81a2b3da3e4a
SHA1d8eadf8436f0190752b0c5095678eec0f3b8d7eb
SHA256a51215c157b86c8028e069422af22cb89eb2c6d41caf69d5124d0cfa4b6b34a4
SHA512e6968ea2c13985f331cd66cca160d5bd255196bfb84316b700595ee38a4ef00a230417e7ff8b3d4fc92593fa9a8713e9dad3469ca8d01b4b11a5591b7f5aa0bf
-
Filesize
8KB
MD5c8e5e6a047dce17af5af5662e7075fba
SHA1362387dd42c4e84278ecc103befe7178efcb7685
SHA256a7a4ab612bd91a468064f17886f2a68185d7fc7bb5988590cee6305b632b5b75
SHA51258cb23c357e8e40bb6e553943cfdba8d0015d234ae36d59b927e312b6aa2a9d4adcf722a1f1da4f3e4656e7e96e80aac5c26fc1d6a1e9daf59130d1e68641ae3
-
Filesize
2KB
MD50d51e1b98dfc318edf5524131274f16f
SHA1f6d4be190c57eded84c1d07ec0dd219ec23b1d11
SHA256a48efa710727e98ae988b0f5ac3e0ca277fcf24fb514eed050a294ddfcc8af83
SHA512ddb208609830e28b497aee9d70c12bc10b4a8a0653ffc0996660d48d87f25c02d78ac705e1fcb49a4d620948d2b84422e20102c6048dacc321476d06154f8f14
-
Filesize
342KB
MD5518bea93002f03577d5b54727a89f8b5
SHA1fcce2a89994003bcc2c65cfa3bfc65185b79ca3d
SHA25675d5f7c4233d61aa36c5ad2a5cf356611b3740ce1b69dc077c9dc0729803ad17
SHA51251b68689d132b20300f06fed4f33296085c5eaf0b765a4e9c9b2968a36fc0cf2b922cc475f5a99c7a799b0ebdecdc0bf6bd7c044515ea9253dc84e45097e454d
-
Filesize
244KB
MD5315a6bcbab69e31731f6587c4a493194
SHA1411a7bcdb152c40feb82823fe84553a73ec3a145
SHA2568935bff6c881d2608af1dc332f29141334c233090d5b76aafc281f596707cbc2
SHA512926116d9c1a0e41c547ecacd8ac4f0a86cc4e0cd48997cbe61bc338fe51e2d19645d50c15e2fe22a02db9c66b37f65986c477720d5e33e6cf67feaf3aaec1311