Analysis
-
max time kernel
129s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 08:46
Behavioral task
behavioral1
Sample
93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe
Resource
win10v2004-20231222-en
General
-
Target
93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe
-
Size
1.1MB
-
MD5
0a33509773de23317cf9121faba8e002
-
SHA1
71afef1a92815b0875360e46345a06e0369a3296
-
SHA256
93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea
-
SHA512
cc505d73fcd0d83eab53d757e8883b07abd4be69eebd9b3abbee5fc2b7a6aa099d1828e3b3d4949ec5bf0206e88f193e1775fd938d54cbfb5b289318251f69fb
-
SSDEEP
12288:ZEmC92VnpahSR7BwkASR49lkQHMIWnDp2f47z4PUUhyVb4yDKUgM03qcmT1Pd2KY:ZEF96C6BwkP2lsl8fEQemdM03zmT1PS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2716 cmd.exe -
resource yara_rule behavioral1/memory/2992-0-0x0000000001050000-0x000000000118C000-memory.dmp upx behavioral1/memory/2992-35-0x0000000001050000-0x000000000118C000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\WindowsShell6204671.log 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe File opened for modification C:\Windows\WindowSystemNewUpdate78.log UserAccountControlSettings.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2884 3056 WerFault.exe 16 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe Token: SeDebugPrivilege 2808 UserAccountControlSettings.exe Token: SeIncBasePriorityPrivilege 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3056 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 16 PID 2992 wrote to memory of 3056 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 16 PID 2992 wrote to memory of 3056 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 16 PID 2992 wrote to memory of 3056 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 16 PID 2992 wrote to memory of 3056 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 16 PID 2992 wrote to memory of 3056 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 16 PID 2992 wrote to memory of 3056 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 16 PID 3056 wrote to memory of 2884 3056 cttune.exe 17 PID 3056 wrote to memory of 2884 3056 cttune.exe 17 PID 3056 wrote to memory of 2884 3056 cttune.exe 17 PID 3056 wrote to memory of 2884 3056 cttune.exe 17 PID 2992 wrote to memory of 2808 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 30 PID 2992 wrote to memory of 2808 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 30 PID 2992 wrote to memory of 2808 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 30 PID 2992 wrote to memory of 2808 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 30 PID 2992 wrote to memory of 2808 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 30 PID 2992 wrote to memory of 2808 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 30 PID 2992 wrote to memory of 2808 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 30 PID 2992 wrote to memory of 2716 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 31 PID 2992 wrote to memory of 2716 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 31 PID 2992 wrote to memory of 2716 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 31 PID 2992 wrote to memory of 2716 2992 93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe 31
Processes
-
C:\Windows\SysWOW64\cttune.exe"C:\Windows\SysWOW64\cttune.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 1882⤵
- Program crash
PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe"C:\Users\Admin\AppData\Local\Temp\93d98b2a770303cb86d0712cd170a55f7d6367ca2102545cff1136b9793b1aea.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\UserAccountControlSettings.exe"C:\Windows\SysWOW64\UserAccountControlSettings.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\93D98B~1.EXE > nul2⤵
- Deletes itself
PID:2716
-