Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 17:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
30c9a5c6b421f20ed4239c46079b292b.exe
Resource
win7-20231215-en
7 signatures
150 seconds
General
-
Target
30c9a5c6b421f20ed4239c46079b292b.exe
-
Size
23KB
-
MD5
30c9a5c6b421f20ed4239c46079b292b
-
SHA1
32932869cc47ca50da91de58f406f5ecd343291a
-
SHA256
a708ca27a42f32dca3774e1fdec4ad25d581c84395562b1e4ccac1a3abc48395
-
SHA512
d561c47c408086bd8bba0cb7656b4e1e7415252887cdf879b5201c797090f337cfbf5bd0f7f92e7eb0a92b5ba960dea1699e45af3b9f7c94f2556606073bf6c8
-
SSDEEP
384:/3Eh9xqX7jumYaNb6SxZLIXYQPhMVDrgHa/Dw1IFodlabry/labryJz:MhjgumLNblmOKwk1IOany9anyJz
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 30c9a5c6b421f20ed4239c46079b292b.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2404 ipconfig.exe 3016 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2616 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2448 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2448 powershell.exe Token: SeDebugPrivilege 2624 whoami.exe Token: SeDebugPrivilege 3016 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2448 2352 30c9a5c6b421f20ed4239c46079b292b.exe 29 PID 2352 wrote to memory of 2448 2352 30c9a5c6b421f20ed4239c46079b292b.exe 29 PID 2352 wrote to memory of 2448 2352 30c9a5c6b421f20ed4239c46079b292b.exe 29 PID 2352 wrote to memory of 2448 2352 30c9a5c6b421f20ed4239c46079b292b.exe 29 PID 2448 wrote to memory of 2400 2448 powershell.exe 33 PID 2448 wrote to memory of 2400 2448 powershell.exe 33 PID 2448 wrote to memory of 2400 2448 powershell.exe 33 PID 2448 wrote to memory of 2400 2448 powershell.exe 33 PID 2400 wrote to memory of 2624 2400 cmd.exe 32 PID 2400 wrote to memory of 2624 2400 cmd.exe 32 PID 2400 wrote to memory of 2624 2400 cmd.exe 32 PID 2400 wrote to memory of 2624 2400 cmd.exe 32 PID 2400 wrote to memory of 2616 2400 cmd.exe 31 PID 2400 wrote to memory of 2616 2400 cmd.exe 31 PID 2400 wrote to memory of 2616 2400 cmd.exe 31 PID 2400 wrote to memory of 2616 2400 cmd.exe 31 PID 2400 wrote to memory of 2404 2400 cmd.exe 36 PID 2400 wrote to memory of 2404 2400 cmd.exe 36 PID 2400 wrote to memory of 2404 2400 cmd.exe 36 PID 2400 wrote to memory of 2404 2400 cmd.exe 36 PID 2400 wrote to memory of 3016 2400 cmd.exe 35 PID 2400 wrote to memory of 3016 2400 cmd.exe 35 PID 2400 wrote to memory of 3016 2400 cmd.exe 35 PID 2400 wrote to memory of 3016 2400 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\30c9a5c6b421f20ed4239c46079b292b.exe"C:\Users\Admin\AppData\Local\Temp\30c9a5c6b421f20ed4239c46079b292b.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -executionpolicy bypass -command .\racoon.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "whoami.exe && systeminfo.exe && ipconfig.exe && netstat.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\NETSTAT.EXEnetstat.exe4⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig.exe4⤵
- Gathers network information
PID:2404
-
-
-
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo.exe1⤵
- Gathers system information
PID:2616
-
C:\Windows\SysWOW64\whoami.exewhoami.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2624