Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
216ddf3320816f6c8d31dc59a2275fbb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
216ddf3320816f6c8d31dc59a2275fbb.exe
Resource
win10v2004-20231222-en
General
-
Target
216ddf3320816f6c8d31dc59a2275fbb.exe
-
Size
611KB
-
MD5
216ddf3320816f6c8d31dc59a2275fbb
-
SHA1
46b06da7d1dd7f0340135f11105a45e49ff7bdd7
-
SHA256
ea08f3d33ba5f7f5fe4fb00380569fc21e374f6eee77dda2ceddbfd2bef5da9b
-
SHA512
7f486b374d248e6d45aae103a0419d7842fd94dfb154a8e60ee5a148f5de4d161a5a3399defd8a522c911fb0b2784fe5d7f1163fdb153e625aeb8f827df74dc3
-
SSDEEP
12288:fWvTTAfgp+Nz8o43TEazs5hzPRx1M4auuSJFfvHg:+LTAfBE3TEazs/tXdbuSLvHg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2304 s6473.exe -
Loads dropped DLL 4 IoCs
pid Process 2204 216ddf3320816f6c8d31dc59a2275fbb.exe 2204 216ddf3320816f6c8d31dc59a2275fbb.exe 2204 216ddf3320816f6c8d31dc59a2275fbb.exe 2204 216ddf3320816f6c8d31dc59a2275fbb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2304 s6473.exe 2304 s6473.exe 2304 s6473.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2304 s6473.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2304 s6473.exe 2304 s6473.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2304 2204 216ddf3320816f6c8d31dc59a2275fbb.exe 28 PID 2204 wrote to memory of 2304 2204 216ddf3320816f6c8d31dc59a2275fbb.exe 28 PID 2204 wrote to memory of 2304 2204 216ddf3320816f6c8d31dc59a2275fbb.exe 28 PID 2204 wrote to memory of 2304 2204 216ddf3320816f6c8d31dc59a2275fbb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\216ddf3320816f6c8d31dc59a2275fbb.exe"C:\Users\Admin\AppData\Local\Temp\216ddf3320816f6c8d31dc59a2275fbb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\n6473\s6473.exe"C:\Users\Admin\AppData\Local\Temp\n6473\s6473.exe" 94d5aa02b056d2b0d81a27b7QGC8QTK47o+CFXhCLRTfai0xn+i89RTD3jE8qMcjGSRDv3UwHarzmMS3J3keiJWAf6j9nuRYUyBP6GGi07gL0+8pEI2K2UBA0attFGpncNNYBhjX9WBsl3mhMPhhpRn1SQjyLGosKSl81xxCDpneUxhLG8U9oMuDmn7oewk= /v "C:\Users\Admin\AppData\Local\Temp\216ddf3320816f6c8d31dc59a2275fbb.exe" /a2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
351KB
MD5441952171f5862888c657eff54344b3a
SHA1560a322d08f59c920ef6df95858ccffae0d0db83
SHA256b249e9d194fcc51dce926f71ce16b3ff47d1302f0c1c0940a488c46ac00e9c8f
SHA5120c7fa23991ad0ac0996d6aea7233f7c2d906f53dbcecf52e28e9b9a2b98909a92aee93dfeaad36e6094f3ec0a793bbd44331bea095cdb7614909a2d4e6fb76e1