Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
199559831e72e73dcda2dc5f938d7595.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
199559831e72e73dcda2dc5f938d7595.exe
Resource
win10v2004-20231215-en
General
-
Target
199559831e72e73dcda2dc5f938d7595.exe
-
Size
743KB
-
MD5
199559831e72e73dcda2dc5f938d7595
-
SHA1
b4d36c6719c8baf43ce13bd2a7ce9eb56537a8b0
-
SHA256
cf2a6a1281998dee1fb893e716d8254a2cbe3c563373cac2092d510203389eac
-
SHA512
10ae0634f567be1ce7b74a6446f44b583eb539b2c76e4128eaa6eb884b805c6c2aef1a46425493752dc929155c470d207a5086108cd981087159ac99319a9df2
-
SSDEEP
12288:dRn8S++U4u/n/80dW5A0zyo6JwQ5oAlK+GPHvZkIkn+QQ52LYRgc8yPwDRNdE:n8MU4ufxdW5A2mJr/kNHvSIknU3Y
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2972 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 796 dsadqfq.cn.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\dsadqfq.cn.exe 199559831e72e73dcda2dc5f938d7595.exe File opened for modification C:\Windows\dsadqfq.cn.exe 199559831e72e73dcda2dc5f938d7595.exe File created C:\Windows\61642520.BAT 199559831e72e73dcda2dc5f938d7595.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1724 199559831e72e73dcda2dc5f938d7595.exe Token: SeDebugPrivilege 796 dsadqfq.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 796 dsadqfq.cn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 796 wrote to memory of 1728 796 dsadqfq.cn.exe 28 PID 796 wrote to memory of 1728 796 dsadqfq.cn.exe 28 PID 796 wrote to memory of 1728 796 dsadqfq.cn.exe 28 PID 796 wrote to memory of 1728 796 dsadqfq.cn.exe 28 PID 1724 wrote to memory of 2972 1724 199559831e72e73dcda2dc5f938d7595.exe 30 PID 1724 wrote to memory of 2972 1724 199559831e72e73dcda2dc5f938d7595.exe 30 PID 1724 wrote to memory of 2972 1724 199559831e72e73dcda2dc5f938d7595.exe 30 PID 1724 wrote to memory of 2972 1724 199559831e72e73dcda2dc5f938d7595.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\199559831e72e73dcda2dc5f938d7595.exe"C:\Users\Admin\AppData\Local\Temp\199559831e72e73dcda2dc5f938d7595.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\61642520.BAT2⤵
- Deletes itself
PID:2972
-
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"1⤵PID:1728
-
C:\Windows\dsadqfq.cn.exeC:\Windows\dsadqfq.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:796
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD50bc4eef91896cbbed83711422c06431b
SHA12e4114b8c04d36684eb811bdff6889e349c044e8
SHA2569ff29148e7fd054c7dab2ec881088e8f4b3a231411344fb0ebed6ee000ea849e
SHA5123f7367c3a80492f189ef8fb16b09e8ae063a95a69ad264706770099bc90e93f316ff5bdab76ed9b5788573bbc58db9460cc79e48526d36bbc5abad499c1ebc94
-
Filesize
743KB
MD5199559831e72e73dcda2dc5f938d7595
SHA1b4d36c6719c8baf43ce13bd2a7ce9eb56537a8b0
SHA256cf2a6a1281998dee1fb893e716d8254a2cbe3c563373cac2092d510203389eac
SHA51210ae0634f567be1ce7b74a6446f44b583eb539b2c76e4128eaa6eb884b805c6c2aef1a46425493752dc929155c470d207a5086108cd981087159ac99319a9df2