Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
3ace6fca2ff49a28e99f632bee5125ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ace6fca2ff49a28e99f632bee5125ff.exe
Resource
win10v2004-20231215-en
General
-
Target
3ace6fca2ff49a28e99f632bee5125ff.exe
-
Size
1.3MB
-
MD5
3ace6fca2ff49a28e99f632bee5125ff
-
SHA1
0930f72c421e3d7057aea8335277f67e730e4f85
-
SHA256
a2f5879fce8098dce5ea1826bb47aecac5b69fc94511bcfc9895e2864bf3fa68
-
SHA512
d2612f59748648eb55a56956bac5f28869656daa68b72c4a8be5e45bc53155755c09d621bbf75e4764328722d3d17dca1974db55d4e735d92bc99f7d95b30566
-
SSDEEP
24576:hWwSDQ36eB6ANF4jMs3/ZIU2asJR7otQPNvvSdmmo/x1U4sAWLW9QAoQYP29Fvn9:aDQl6Abo1h52NTDPNvm+x1U4sXWOhBKz
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2916 DNFòùòð0.3.0.exe 2768 silv.exe -
Loads dropped DLL 1 IoCs
pid Process 2768 silv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\WIN32_MS.ime silv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\£<jw(šx4ÿC:\Windows\system32\MS.log silv.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2916 DNFòùòð0.3.0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2916 DNFòùòð0.3.0.exe Token: SeBackupPrivilege 2916 DNFòùòð0.3.0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2916 DNFòùòð0.3.0.exe 2916 DNFòùòð0.3.0.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2916 2232 3ace6fca2ff49a28e99f632bee5125ff.exe 29 PID 2232 wrote to memory of 2916 2232 3ace6fca2ff49a28e99f632bee5125ff.exe 29 PID 2232 wrote to memory of 2916 2232 3ace6fca2ff49a28e99f632bee5125ff.exe 29 PID 2232 wrote to memory of 2916 2232 3ace6fca2ff49a28e99f632bee5125ff.exe 29 PID 2232 wrote to memory of 2916 2232 3ace6fca2ff49a28e99f632bee5125ff.exe 29 PID 2232 wrote to memory of 2916 2232 3ace6fca2ff49a28e99f632bee5125ff.exe 29 PID 2232 wrote to memory of 2916 2232 3ace6fca2ff49a28e99f632bee5125ff.exe 29 PID 2232 wrote to memory of 2768 2232 3ace6fca2ff49a28e99f632bee5125ff.exe 28 PID 2232 wrote to memory of 2768 2232 3ace6fca2ff49a28e99f632bee5125ff.exe 28 PID 2232 wrote to memory of 2768 2232 3ace6fca2ff49a28e99f632bee5125ff.exe 28 PID 2232 wrote to memory of 2768 2232 3ace6fca2ff49a28e99f632bee5125ff.exe 28 PID 2232 wrote to memory of 2768 2232 3ace6fca2ff49a28e99f632bee5125ff.exe 28 PID 2232 wrote to memory of 2768 2232 3ace6fca2ff49a28e99f632bee5125ff.exe 28 PID 2232 wrote to memory of 2768 2232 3ace6fca2ff49a28e99f632bee5125ff.exe 28 PID 2768 wrote to memory of 2860 2768 silv.exe 31 PID 2768 wrote to memory of 2860 2768 silv.exe 31 PID 2768 wrote to memory of 2860 2768 silv.exe 31 PID 2768 wrote to memory of 2860 2768 silv.exe 31 PID 2768 wrote to memory of 2860 2768 silv.exe 31 PID 2768 wrote to memory of 2860 2768 silv.exe 31 PID 2768 wrote to memory of 2860 2768 silv.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ace6fca2ff49a28e99f632bee5125ff.exe"C:\Users\Admin\AppData\Local\Temp\3ace6fca2ff49a28e99f632bee5125ff.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\silv.exe"C:\silv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\delf764846.bat3⤵PID:2860
-
-
-
C:\DNFòùòð0.3.0.exe"C:\DNFòùòð0.3.0.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2916
-