Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
53e293069ed124d113a302cade13bf4f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53e293069ed124d113a302cade13bf4f.exe
Resource
win10v2004-20231215-en
General
-
Target
53e293069ed124d113a302cade13bf4f.exe
-
Size
72KB
-
MD5
53e293069ed124d113a302cade13bf4f
-
SHA1
074cadb8978b907e45f3f9e0dd9003fd354ba654
-
SHA256
51c65ff22cabca947fc56764ecdfed28755bb2ff55ff556d1bd78b0519a640d8
-
SHA512
a077ce135f8b40f8f42df182c8d5f37ee5bb0666035d09400fb19af27f4ecc9ef80138aad9ca763cf4f672b86b22a7727b60e84e9a3f92a538e1a66eefad32a6
-
SSDEEP
768:CYyJIK/RsskYjUyXGey9yzYyhSda+I6NrZn5ytwg3HFpYPllLLv7G4CV4BDvIiy0:CXJbNUy27kjN6NJ5yVX8PlddvIiyFHB
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 53e293069ed124d113a302cade13bf4f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 53e293069ed124d113a302cade13bf4f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2804 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2804 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2788 53e293069ed124d113a302cade13bf4f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2880 2788 53e293069ed124d113a302cade13bf4f.exe 29 PID 2788 wrote to memory of 2880 2788 53e293069ed124d113a302cade13bf4f.exe 29 PID 2788 wrote to memory of 2880 2788 53e293069ed124d113a302cade13bf4f.exe 29 PID 2788 wrote to memory of 2880 2788 53e293069ed124d113a302cade13bf4f.exe 29 PID 2880 wrote to memory of 2804 2880 cmd.exe 31 PID 2880 wrote to memory of 2804 2880 cmd.exe 31 PID 2880 wrote to memory of 2804 2880 cmd.exe 31 PID 2880 wrote to memory of 2804 2880 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\53e293069ed124d113a302cade13bf4f.exe"C:\Users\Admin\AppData\Local\Temp\53e293069ed124d113a302cade13bf4f.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 53e293069ed124d113a302cade13bf4f.e2⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-