Analysis
-
max time kernel
146s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
51d065d8d79adb829730f55fce9ec9ca.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51d065d8d79adb829730f55fce9ec9ca.exe
Resource
win10v2004-20231215-en
General
-
Target
51d065d8d79adb829730f55fce9ec9ca.exe
-
Size
4.5MB
-
MD5
51d065d8d79adb829730f55fce9ec9ca
-
SHA1
a00c067980d321302a0d86f516d846bbdb264ec4
-
SHA256
59bde3d183feda26deb519a4b9a6655c9ca4461e0724a1f396c8340af644cba1
-
SHA512
f62c5db2c65070d02bbbe221d88e2b2a7294b41fe169bc2828a606497e33eae5d8361908012bed686acd23fe4f13f5cf76da06e08e19ce39b2fa5c1f4ff058ac
-
SSDEEP
98304:s/t6jftK7uPQNtRF+OKDcG0nVSEJA0qRzc2DqoXEDUU+YiwOBpIeWH:YEft3Ez3BG0nVqRQ2TXEDUU7i1zwH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1876 51d065d8d79adb829730f55fce9ec9ca.exe -
Loads dropped DLL 4 IoCs
pid Process 2256 51d065d8d79adb829730f55fce9ec9ca.exe 1876 51d065d8d79adb829730f55fce9ec9ca.exe 1876 51d065d8d79adb829730f55fce9ec9ca.exe 1876 51d065d8d79adb829730f55fce9ec9ca.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1876 51d065d8d79adb829730f55fce9ec9ca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1876 51d065d8d79adb829730f55fce9ec9ca.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1876 51d065d8d79adb829730f55fce9ec9ca.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1876 2256 51d065d8d79adb829730f55fce9ec9ca.exe 28 PID 2256 wrote to memory of 1876 2256 51d065d8d79adb829730f55fce9ec9ca.exe 28 PID 2256 wrote to memory of 1876 2256 51d065d8d79adb829730f55fce9ec9ca.exe 28 PID 2256 wrote to memory of 1876 2256 51d065d8d79adb829730f55fce9ec9ca.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\51d065d8d79adb829730f55fce9ec9ca.exe"C:\Users\Admin\AppData\Local\Temp\51d065d8d79adb829730f55fce9ec9ca.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\4zjysf1c.b0u\51d065d8d79adb829730f55fce9ec9ca.exe"C:\Users\Admin\AppData\Local\Temp\4zjysf1c.b0u\51d065d8d79adb829730f55fce9ec9ca.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
347KB
MD57f3f58430be88846997a003b277f96b6
SHA1aea13d7f1e4e830744918ca20b110db42f16abe5
SHA256736166e25dc9f6a77ae106072d286b78c847e75a21db368c8fa9ca585f8eae83
SHA512607cdb10e86e438458cea3f3ed6e7183657951316293002114107c13295e23a76fe8fafa510a25db1bc8bedbde98423bc43d845716765f1ccfc66a043589ac09
-
Filesize
462KB
MD53702f434d6e9e02a05e92b9ceb86a759
SHA1c300209263ebbba72596eb57717aca36b7d2a21d
SHA256e54305f1ec15653afdb2910ffb62729d6b995db9d474bdc1a4a069aad9054960
SHA512a0ca8894500e395103c79de76c33a7a6f2426f4d49cb2c2a879b177816847fd93cd911b329dff7bda38b9f0c7b4e0b7fc239b567e83cd73fc4c14a8feb26edb5
-
Filesize
9KB
MD52bec3c4daed9450c3b3493df91166d8a
SHA1704c108a7b73a54fd6dcde5ffde621891a3d184a
SHA2566ee22c3139aaa312753f853cc05b7f4bf9a62fc5191c8ed77aaa5759b9065977
SHA51282a38fb438886a237c075bc0f32ac958a204151f147c53aac90f7a24e18febb98ed2de0e792d4ab0c4d9d55eea4301ed58d088eccf505bd61bf79775522b48d7
-
Filesize
10KB
MD5dc06bd25f09a94a709987e26a14b625d
SHA1b979a99e1c6e695b6e27a7954d65a10337e5cd43
SHA2564ac73febe65bc0bf87ac44c572b459cb43c18b0219755b5fe765877f4f2c2d53
SHA512dc9a4b0bd8c9fc37442d0195b13cf2a978c2b2b58d8f22bb6b649cf3a9377536b7b92115c74077703e57bbfb395d248af91c76939a3f904dcdce89b22e960c4b
-
Filesize
416KB
MD5aff64a11f4b7eca8fb778afdbc5ba4fd
SHA1e00b3da208b092bcc4d0d28dafc9404f50e12bbd
SHA256b2d408824c6d62a1814f316e70340fca764df5cd6b39f860ff9e5b3908371a99
SHA512c306550df64525dd65c26161e2b05c1b3d3bb2aaa23a700819333255c8d08d9d6fbcbcbeb10a32e252356a73caa314917db0227f4fbc5a364aa0bb4c13db9a47
-
Filesize
105KB
MD5254bf3d874dcfb2af1dc86751737f97d
SHA192a114c986af050ed5ab700c953afe80b3aa9b87
SHA256643df7863f007013e3d0b2b76fce8dc0a305e8f786cd54d463b7b720d1b5049f
SHA5127cc057ec1c455a5cc1266c8118be3bc7c417e2787f530e6376ba2d146115b89d5151e0be9ccae846ea25faf767f9021391c20e7e10a4ea5681785307c7b24bb9
-
Filesize
108KB
MD5a42fbacce72315a400b001e02e0ca5d1
SHA17c2b43131245e2c682fc8aef4127be7f93e34f50
SHA2565fe515e3f42ca2bf232f3662516f18e846064739295a2c72f7d8bbf33190e902
SHA51240bacfa665be9070c1b77cd582688bd4c3333c0d0dee846af06fc1faa583f65cf84cd5b2582fa36a977c4e411f80414ed67ba5417931a94d8b246753b600fc66
-
Filesize
159KB
MD5ec20ab57db771ea7c02fb37c855343ec
SHA1219a07855975a54c9f082714210c798d35e996f5
SHA256d010e74a82487a8795c2b338a4094e3dabcf72c26c695be6fdf1177f7f9ee100
SHA512966f2110a34e574cbe865d59ac8c6b75aae09979c722b5c8f14fb9a6ff3c44877394f60b51b4588e9a211e4a3c94102b447bb3f47b5140e62ab1edbd5a096dab