Analysis
-
max time kernel
143s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
6b5f79860c70c89a19be367a9844faa7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6b5f79860c70c89a19be367a9844faa7.exe
Resource
win10v2004-20231222-en
General
-
Target
6b5f79860c70c89a19be367a9844faa7.exe
-
Size
227KB
-
MD5
6b5f79860c70c89a19be367a9844faa7
-
SHA1
134f325f9857648dc69accbf5ce5fe50b64b9b0b
-
SHA256
e07b72c28d281eaed3069b8fc550eec5bb8e5a14e71b7e5291e54194115296c2
-
SHA512
f9ae3ca5374b191d87794f94aedcb4cce81bb53293d679530b742ee0ad611d478c823e9170eead935cf3b4dd8ddf0e19949c8d6a3e405ec910a772cd49819d39
-
SSDEEP
6144:JDMIbfTqE3/tQf7cQTmAgc3De9/wVKlinRNW8Xogm7NdMi:ZXmCM5mAgcTYHibXoV7NB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2192 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2400 anokroxm.exe -
Loads dropped DLL 4 IoCs
pid Process 2192 cmd.exe 2192 cmd.exe 2400 anokroxm.exe 2400 anokroxm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 1736 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2716 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2400 anokroxm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1736 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2400 anokroxm.exe 2400 anokroxm.exe 2400 anokroxm.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2400 anokroxm.exe 2400 anokroxm.exe 2400 anokroxm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2192 2536 6b5f79860c70c89a19be367a9844faa7.exe 23 PID 2536 wrote to memory of 2192 2536 6b5f79860c70c89a19be367a9844faa7.exe 23 PID 2536 wrote to memory of 2192 2536 6b5f79860c70c89a19be367a9844faa7.exe 23 PID 2536 wrote to memory of 2192 2536 6b5f79860c70c89a19be367a9844faa7.exe 23 PID 2192 wrote to memory of 1736 2192 cmd.exe 20 PID 2192 wrote to memory of 1736 2192 cmd.exe 20 PID 2192 wrote to memory of 1736 2192 cmd.exe 20 PID 2192 wrote to memory of 1736 2192 cmd.exe 20 PID 2192 wrote to memory of 2716 2192 cmd.exe 22 PID 2192 wrote to memory of 2716 2192 cmd.exe 22 PID 2192 wrote to memory of 2716 2192 cmd.exe 22 PID 2192 wrote to memory of 2716 2192 cmd.exe 22 PID 2192 wrote to memory of 2400 2192 cmd.exe 33 PID 2192 wrote to memory of 2400 2192 cmd.exe 33 PID 2192 wrote to memory of 2400 2192 cmd.exe 33 PID 2192 wrote to memory of 2400 2192 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b5f79860c70c89a19be367a9844faa7.exe"C:\Users\Admin\AppData\Local\Temp\6b5f79860c70c89a19be367a9844faa7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2536 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\6b5f79860c70c89a19be367a9844faa7.exe" & start C:\Users\Admin\AppData\Local\anokroxm.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\anokroxm.exeC:\Users\Admin\AppData\Local\anokroxm.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2400
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 25361⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.11⤵
- Runs ping.exe
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fcd92b06ffe93b6802b65e4c342ccd2c
SHA11ba4595268c28baa55827e549da404391196671e
SHA2564350bfb9ca3878f8d58c21439e9b03ab83330228fef69dd4484ded6ca4cda4d7
SHA51282dbb9bee3c2e917a5088d556034ae28e91d7d80c0e4994981c1d67c0e49dfef208309727084439967fd593b589817b2ca07e238e0ac9ea7a149c13a52c53626
-
Filesize
227KB
MD56b5f79860c70c89a19be367a9844faa7
SHA1134f325f9857648dc69accbf5ce5fe50b64b9b0b
SHA256e07b72c28d281eaed3069b8fc550eec5bb8e5a14e71b7e5291e54194115296c2
SHA512f9ae3ca5374b191d87794f94aedcb4cce81bb53293d679530b742ee0ad611d478c823e9170eead935cf3b4dd8ddf0e19949c8d6a3e405ec910a772cd49819d39