Analysis
-
max time kernel
200s -
max time network
242s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 11:53
Static task
static1
Behavioral task
behavioral1
Sample
1c3fef3f51c0f19e488b41f9bc112d69.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c3fef3f51c0f19e488b41f9bc112d69.exe
Resource
win10v2004-20231215-en
General
-
Target
1c3fef3f51c0f19e488b41f9bc112d69.exe
-
Size
391KB
-
MD5
1c3fef3f51c0f19e488b41f9bc112d69
-
SHA1
393a400cfb382ef65a8eaf65cb627f06e4982456
-
SHA256
228247219d6b7a7fa103ddcb3e04f63b388fc0c8a6dbcb30cd49f62b77e21e0d
-
SHA512
81afb8206c9af992164836f5742a05a5c5d692d45dafe424675bb20bac96d997bd92510319365b350f87eb71d46fce649fd12dadcd9e3d1cc8d229bd4237039f
-
SSDEEP
6144:0Gyw99vtxI7XzzQoRXdla8To8maHHko/9FsHbtR28mI7r:w4vt6bXQoRXdlHToQnl9OH2NI7r
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2548 1c3fef3f51c0f19e488b41f9bc112d69.exe 2548 1c3fef3f51c0f19e488b41f9bc112d69.exe 2548 1c3fef3f51c0f19e488b41f9bc112d69.exe 2548 1c3fef3f51c0f19e488b41f9bc112d69.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main 1c3fef3f51c0f19e488b41f9bc112d69.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2548 1c3fef3f51c0f19e488b41f9bc112d69.exe Token: 33 856 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 856 AUDIODG.EXE Token: 33 856 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 856 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2548 1c3fef3f51c0f19e488b41f9bc112d69.exe 2548 1c3fef3f51c0f19e488b41f9bc112d69.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c3fef3f51c0f19e488b41f9bc112d69.exe"C:\Users\Admin\AppData\Local\Temp\1c3fef3f51c0f19e488b41f9bc112d69.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2548
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1YVWL6AI\px[1].js
Filesize346B
MD5f84f931c0dd37448e03f0dabf4e4ca9f
SHA19c2c50edcf576453ccc07bf65668bd23c76e8663
SHA2565c1d5fd46a88611c31ecbb8ffc1142a7e74ec7fb7d72bd3891131c880ef3f584
SHA512afc3089d932fb030e932bf6414ac05681771051dd51d164f09635ca09cbd8525a52879524b6aa24e972e7766ddf529484cc1ec416de8b61255435a89ba781f8c
-
Filesize
264KB
MD5b795e14dcb8b6f9f79c459c033cc5218
SHA1337d7e4d738dcfc54bda89c76857d834b4fc937a
SHA2566f952d44fef31c1ea27ec812a6102dda47529a9c14589ca36e6d27f67565d905
SHA512d93b1d3b5351f97b0af91589378f9b4733efb13510531cdd58936f8bd0bdc4d8ad9a613dea3a023d77e516dca40fe87e729346fd7825e0e30ab71a8dcf665e4f