Analysis
-
max time kernel
149s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 12:38
Static task
static1
Behavioral task
behavioral1
Sample
1efaec67d656e7d858cfa7610271504b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1efaec67d656e7d858cfa7610271504b.exe
Resource
win10v2004-20231215-en
General
-
Target
1efaec67d656e7d858cfa7610271504b.exe
-
Size
304KB
-
MD5
1efaec67d656e7d858cfa7610271504b
-
SHA1
8ba2f6d9c5c4168551e2fddc1e6c3e1b1376a120
-
SHA256
6920382e522b23c3dd0013936783870ca21397cdf07ad906e9b389706889c926
-
SHA512
673a29809008c8b8b068720636d551dac3b42a46f130200fbe78624a14a6cd1f3b1a807def5178aa67e0fa48886c49ab917cdc21108e680dbed59fe7e767564a
-
SSDEEP
6144:wXg115KuLDerlMBFBpV/Dxmc7ib2fDaXT2cLpKqXyZWTU:p1+9kZFxm2q2WXqOp9XUW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
1efaec67d656e7d858cfa7610271504b.exepid process 3040 1efaec67d656e7d858cfa7610271504b.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1efaec67d656e7d858cfa7610271504b.exedescription pid process target process PID 4936 set thread context of 3040 4936 1efaec67d656e7d858cfa7610271504b.exe 1efaec67d656e7d858cfa7610271504b.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process 804 3040 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1efaec67d656e7d858cfa7610271504b.exedescription pid process Token: SeDebugPrivilege 4936 1efaec67d656e7d858cfa7610271504b.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
1efaec67d656e7d858cfa7610271504b.execsc.exedescription pid process target process PID 4936 wrote to memory of 4816 4936 1efaec67d656e7d858cfa7610271504b.exe csc.exe PID 4936 wrote to memory of 4816 4936 1efaec67d656e7d858cfa7610271504b.exe csc.exe PID 4936 wrote to memory of 4816 4936 1efaec67d656e7d858cfa7610271504b.exe csc.exe PID 4816 wrote to memory of 1100 4816 csc.exe cvtres.exe PID 4816 wrote to memory of 1100 4816 csc.exe cvtres.exe PID 4816 wrote to memory of 1100 4816 csc.exe cvtres.exe PID 4936 wrote to memory of 3040 4936 1efaec67d656e7d858cfa7610271504b.exe 1efaec67d656e7d858cfa7610271504b.exe PID 4936 wrote to memory of 3040 4936 1efaec67d656e7d858cfa7610271504b.exe 1efaec67d656e7d858cfa7610271504b.exe PID 4936 wrote to memory of 3040 4936 1efaec67d656e7d858cfa7610271504b.exe 1efaec67d656e7d858cfa7610271504b.exe PID 4936 wrote to memory of 3040 4936 1efaec67d656e7d858cfa7610271504b.exe 1efaec67d656e7d858cfa7610271504b.exe PID 4936 wrote to memory of 3040 4936 1efaec67d656e7d858cfa7610271504b.exe 1efaec67d656e7d858cfa7610271504b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1efaec67d656e7d858cfa7610271504b.exe"C:\Users\Admin\AppData\Local\Temp\1efaec67d656e7d858cfa7610271504b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\o36a3jfv.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES71A7.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC71A6.tmp"3⤵
-
C:\Users\Admin\AppData\Roaming\1efaec67d656e7d858cfa7610271504b.exeC:\Users\Admin\AppData\Roaming\1efaec67d656e7d858cfa7610271504b.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3040 -ip 30401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 121⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RES71A7.tmpFilesize
1KB
MD5e75c2440341fde8add4ded45698209e5
SHA1612dae47ba3ef9ba45ed549dfe3fc6d811c89f73
SHA2568959c1b9e4c5d1aa721f11d151f51bcce98b49792b3b03cb5c1f4fab59305f41
SHA51200441245f40ea3fdb0a77898fa8ab13866451c405fd8369d752f85cc35481d132f93c3cd1637dfaf8d953d2890b96bfa2268763ec853294ca8727acedcf86588
-
C:\Users\Admin\AppData\Local\Temp\o36a3jfv.dllFilesize
5KB
MD51932c1765d2e3c8f78e92f398fc65479
SHA1726628b9aa99af6cdc4f4cb89b7f2d12236b4428
SHA256549db69fbd81c2483466a78f098918d4ae1b50812632ec6c96fea87434a06f94
SHA51242caeff64684ead9549f1cf83ae62a0a2e752dc924f6afa1e087beec312ca34138e56b08c8d3939e7a08a6b3ac598e790d12a5a3d7a183ae0f657b3dd244dcd2
-
C:\Users\Admin\AppData\Roaming\1efaec67d656e7d858cfa7610271504b.exeFilesize
6KB
MD5d89fdbb4172cee2b2f41033e62c677d6
SHA1c1917b579551f0915f1a0a8e8e3c7a6809284e6b
SHA2562cbdc0ddc7901a9b89615cc338f63e1800f864db431e7a7a85749f73cba0b383
SHA51248941f08ae00d342b52e3255b99ce36abb4e46a48075a760869bc86b1a32c0737eb2bd5e43d5ee665303ab134282f9732738755c4027043ed2d4f414faab63ed
-
\??\c:\Users\Admin\AppData\Local\Temp\CSC71A6.tmpFilesize
652B
MD59d4d9315de0389ba7e8d7e823751e684
SHA182c04193ac243f3277e97dad77092fed6b293404
SHA2560c27ae787f0cee107e1813881e883e7247d8a57bf9d53e7fdc44a0c6b5ef5175
SHA5129f40956164fcc3ddae330b9fa9591f78b92b17e2500afd42423113beef8a5fa62b131fe3387fe63d20555c61145b96ea5c06f41d107a7da6f6d51cddb476750c
-
\??\c:\Users\Admin\AppData\Local\Temp\o36a3jfv.0.csFilesize
5KB
MD5cb25540570735d26bf391e8b54579396
SHA1135651d49409214d21348bb879f7973384a7a8cb
SHA256922ec415710a6e1465ed8553838ddf19c8deb32b75da6dfaca372c1067d2d743
SHA512553ce9d3647b196ccbd6612c06d301afac992130ec5c80fe8fa8a42bab4250053fad651227ff97d9fab4ba8aaff562d421236dc0b2b5d0d4a17430985dd07080
-
\??\c:\Users\Admin\AppData\Local\Temp\o36a3jfv.cmdlineFilesize
206B
MD51280463fbea6e36ee0f167c018a03f9b
SHA1c4d7d359dce92204c57fab580cd2502507b0e778
SHA256cc9b67f8dae785de50be75b7d1a168ff7ff0f13ac79d0c4f0ae58ac5da80be58
SHA512bb502c76727022b3a2b8ee9833aaa82624a450885f6e602cfb7ef1a486acac61304cf819c58fee0706476f6662d5fee18adabbfcae3922058bc5603f13281419
-
memory/3040-22-0x0000000000400000-0x0000000000400000-memory.dmp
-
memory/4816-8-0x00000000009B0000-0x00000000009C0000-memory.dmpFilesize
64KB
-
memory/4936-0-0x0000000074BF0000-0x00000000751A1000-memory.dmpFilesize
5.7MB
-
memory/4936-2-0x0000000001630000-0x0000000001640000-memory.dmpFilesize
64KB
-
memory/4936-1-0x0000000074BF0000-0x00000000751A1000-memory.dmpFilesize
5.7MB
-
memory/4936-21-0x0000000074BF0000-0x00000000751A1000-memory.dmpFilesize
5.7MB