Analysis

  • max time kernel
    141s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 11:07

General

  • Target

    199559831e72e73dcda2dc5f938d7595.exe

  • Size

    743KB

  • MD5

    199559831e72e73dcda2dc5f938d7595

  • SHA1

    b4d36c6719c8baf43ce13bd2a7ce9eb56537a8b0

  • SHA256

    cf2a6a1281998dee1fb893e716d8254a2cbe3c563373cac2092d510203389eac

  • SHA512

    10ae0634f567be1ce7b74a6446f44b583eb539b2c76e4128eaa6eb884b805c6c2aef1a46425493752dc929155c470d207a5086108cd981087159ac99319a9df2

  • SSDEEP

    12288:dRn8S++U4u/n/80dW5A0zyo6JwQ5oAlK+GPHvZkIkn+QQ52LYRgc8yPwDRNdE:n8MU4ufxdW5A2mJr/kNHvSIknU3Y

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\199559831e72e73dcda2dc5f938d7595.exe
    "C:\Users\Admin\AppData\Local\Temp\199559831e72e73dcda2dc5f938d7595.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\61642520.BAT
      2⤵
      • Deletes itself
      PID:2972
  • C:\Program Files\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
    1⤵
      PID:1728
    • C:\Windows\dsadqfq.cn.exe
      C:\Windows\dsadqfq.cn.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:796

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\61642520.BAT

      Filesize

      190B

      MD5

      0bc4eef91896cbbed83711422c06431b

      SHA1

      2e4114b8c04d36684eb811bdff6889e349c044e8

      SHA256

      9ff29148e7fd054c7dab2ec881088e8f4b3a231411344fb0ebed6ee000ea849e

      SHA512

      3f7367c3a80492f189ef8fb16b09e8ae063a95a69ad264706770099bc90e93f316ff5bdab76ed9b5788573bbc58db9460cc79e48526d36bbc5abad499c1ebc94

    • C:\Windows\dsadqfq.cn.exe

      Filesize

      743KB

      MD5

      199559831e72e73dcda2dc5f938d7595

      SHA1

      b4d36c6719c8baf43ce13bd2a7ce9eb56537a8b0

      SHA256

      cf2a6a1281998dee1fb893e716d8254a2cbe3c563373cac2092d510203389eac

      SHA512

      10ae0634f567be1ce7b74a6446f44b583eb539b2c76e4128eaa6eb884b805c6c2aef1a46425493752dc929155c470d207a5086108cd981087159ac99319a9df2

    • memory/796-12-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/796-15-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/796-16-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/796-17-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/796-21-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/1724-0-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/1724-13-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB