Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
10ee601047d30fdc8cde26e85b85ea9e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
10ee601047d30fdc8cde26e85b85ea9e.exe
Resource
win10v2004-20231215-en
General
-
Target
10ee601047d30fdc8cde26e85b85ea9e.exe
-
Size
757KB
-
MD5
10ee601047d30fdc8cde26e85b85ea9e
-
SHA1
92d359c18a7bccbcb5360e7810f037f071e4ffe6
-
SHA256
c18770a8cbfc5ff7ceeaa918208c2e4827f3e2275d2030750ec6bd3f8cd7b2c9
-
SHA512
6874829d03e945e3d6d644a960515493c4ff771370e67a475b85fa38d0075243e0bec4ff1312afea405df9a42ff0daebc064bdfa6f5f6550431efe6da6088650
-
SSDEEP
12288:6EwS/TZxglpaO3GW5A9ArVXPNilTjh7LyvjEkIkLT3n5xrs8Z2wJ5k6Rd3CKNnDd:6B2YlpTGW5A9ArN8p9yv7IkLkQj7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1820 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\HgzServer\svchost.exe 10ee601047d30fdc8cde26e85b85ea9e.exe File opened for modification C:\Program Files (x86)\HgzServer\svchost.exe 10ee601047d30fdc8cde26e85b85ea9e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3560 10ee601047d30fdc8cde26e85b85ea9e.exe Token: SeDebugPrivilege 1820 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 svchost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1820 wrote to memory of 4440 1820 svchost.exe 39 PID 1820 wrote to memory of 4440 1820 svchost.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\10ee601047d30fdc8cde26e85b85ea9e.exe"C:\Users\Admin\AppData\Local\Temp\10ee601047d30fdc8cde26e85b85ea9e.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
C:\Program Files (x86)\HgzServer\svchost.exe"C:\Program Files (x86)\HgzServer\svchost.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4440
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
757KB
MD510ee601047d30fdc8cde26e85b85ea9e
SHA192d359c18a7bccbcb5360e7810f037f071e4ffe6
SHA256c18770a8cbfc5ff7ceeaa918208c2e4827f3e2275d2030750ec6bd3f8cd7b2c9
SHA5126874829d03e945e3d6d644a960515493c4ff771370e67a475b85fa38d0075243e0bec4ff1312afea405df9a42ff0daebc064bdfa6f5f6550431efe6da6088650