Analysis
-
max time kernel
0s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 06:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
58ad6b1200dca0f54dce6269d9c87132.exe
Resource
win7-20231215-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
58ad6b1200dca0f54dce6269d9c87132.exe
Resource
win10v2004-20231215-en
10 signatures
150 seconds
General
-
Target
58ad6b1200dca0f54dce6269d9c87132.exe
-
Size
736KB
-
MD5
58ad6b1200dca0f54dce6269d9c87132
-
SHA1
40d68f1749ae45747fb3ae9099202ca81f49b0b3
-
SHA256
e47e4e843f7360ee8a78a1d7c5d9e520cbed8ad3e1c8f643a384cb9ecc04ccfc
-
SHA512
9279f77349f676b6a35c336f166cd8225f3f51f84d6107fd149fce9c79667e9fae4fa70e7b46510342dd6e3200bd1fa96f8d3fbf946b51b83e56764485d55256
-
SSDEEP
12288:qG3emGMcrDkSHO+nG3emGMcrDkSHO+zSuRYDMhfqMd0QZh9u:qERGd/kQnERGd/kQvfD0QZh9u
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 58ad6b1200dca0f54dce6269d9c87132.exe -
Executes dropped EXE 1 IoCs
pid Process 2740 taskmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2332 set thread context of 2740 2332 58ad6b1200dca0f54dce6269d9c87132.exe 25 -
Program crash 1 IoCs
pid pid_target Process 2408 2740 WerFault.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2664 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe 2332 58ad6b1200dca0f54dce6269d9c87132.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2332 58ad6b1200dca0f54dce6269d9c87132.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2900 2332 58ad6b1200dca0f54dce6269d9c87132.exe 28 PID 2332 wrote to memory of 2900 2332 58ad6b1200dca0f54dce6269d9c87132.exe 28 PID 2332 wrote to memory of 2900 2332 58ad6b1200dca0f54dce6269d9c87132.exe 28 PID 2332 wrote to memory of 2900 2332 58ad6b1200dca0f54dce6269d9c87132.exe 28 PID 2900 wrote to memory of 2896 2900 csc.exe 26 PID 2900 wrote to memory of 2896 2900 csc.exe 26 PID 2900 wrote to memory of 2896 2900 csc.exe 26 PID 2900 wrote to memory of 2896 2900 csc.exe 26 PID 2332 wrote to memory of 2740 2332 58ad6b1200dca0f54dce6269d9c87132.exe 25 PID 2332 wrote to memory of 2740 2332 58ad6b1200dca0f54dce6269d9c87132.exe 25 PID 2332 wrote to memory of 2740 2332 58ad6b1200dca0f54dce6269d9c87132.exe 25 PID 2332 wrote to memory of 2740 2332 58ad6b1200dca0f54dce6269d9c87132.exe 25 PID 2332 wrote to memory of 2740 2332 58ad6b1200dca0f54dce6269d9c87132.exe 25 PID 2332 wrote to memory of 2740 2332 58ad6b1200dca0f54dce6269d9c87132.exe 25 PID 2332 wrote to memory of 2740 2332 58ad6b1200dca0f54dce6269d9c87132.exe 25 PID 2332 wrote to memory of 2740 2332 58ad6b1200dca0f54dce6269d9c87132.exe 25 PID 2332 wrote to memory of 2740 2332 58ad6b1200dca0f54dce6269d9c87132.exe 25 PID 2740 wrote to memory of 2408 2740 taskmgr.exe 24 PID 2740 wrote to memory of 2408 2740 taskmgr.exe 24 PID 2740 wrote to memory of 2408 2740 taskmgr.exe 24 PID 2740 wrote to memory of 2408 2740 taskmgr.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\58ad6b1200dca0f54dce6269d9c87132.exe"C:\Users\Admin\AppData\Local\Temp\58ad6b1200dca0f54dce6269d9c87132.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DNS.bat" "2⤵PID:2844
-
-
C:\Users\Admin\AppData\Roaming\taskmgr.exeC:\Users\Admin\AppData\Roaming\taskmgr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hltpziwb.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2900
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdnsipconfig/releaseipconfig/renew1⤵
- Gathers network information
PID:2664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 1801⤵
- Program crash
PID:2408
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1315.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC1314.tmp"1⤵PID:2896