Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27-12-2023 07:47
Static task
static1
Behavioral task
behavioral1
Sample
a97144af800ff333f4b8a0361d791087.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a97144af800ff333f4b8a0361d791087.exe
Resource
win10v2004-20231215-en
General
-
Target
a97144af800ff333f4b8a0361d791087.exe
-
Size
466KB
-
MD5
a97144af800ff333f4b8a0361d791087
-
SHA1
131cef8e8239477f295dfb84a70304d62652bd6b
-
SHA256
125273103d910e7aec35c4bf75fce7fb0d000eee31b9b5409119f38069dbb722
-
SHA512
ca61bfb7da94969720f2c54ba5c6b16b151405777612f0c78a17f885e668e8bcb69b45ff35c3fcc07a3bde7911d5956ab5f13640a1a806092803eea0b6cb07bb
-
SSDEEP
6144:BWylDcksxWe65bf67rHzZ8Ees9gbCKbGHOOJ3Vd6QBOT+VTJQQCklKAmAAcOGRwj:0yGksh8bfUrH2osCKi7kQBOTrE5F9wfL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 820 PEVerify.exe -
Loads dropped DLL 1 IoCs
pid Process 568 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe = "C:\\Users\\Admin\\AppData\\Roaming\\flash player\\flashplayer.exe" a97144af800ff333f4b8a0361d791087.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe = "\\flash player\\flashplayer.exe" a97144af800ff333f4b8a0361d791087.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2052 set thread context of 2476 2052 a97144af800ff333f4b8a0361d791087.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2052 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 820 PEVerify.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 820 PEVerify.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2476 a97144af800ff333f4b8a0361d791087.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 820 PEVerify.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 820 PEVerify.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 2052 a97144af800ff333f4b8a0361d791087.exe 820 PEVerify.exe 2052 a97144af800ff333f4b8a0361d791087.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2476 a97144af800ff333f4b8a0361d791087.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2052 a97144af800ff333f4b8a0361d791087.exe Token: SeDebugPrivilege 820 PEVerify.exe Token: SeDebugPrivilege 2476 a97144af800ff333f4b8a0361d791087.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2476 a97144af800ff333f4b8a0361d791087.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2476 2052 a97144af800ff333f4b8a0361d791087.exe 31 PID 2052 wrote to memory of 2476 2052 a97144af800ff333f4b8a0361d791087.exe 31 PID 2052 wrote to memory of 2476 2052 a97144af800ff333f4b8a0361d791087.exe 31 PID 2052 wrote to memory of 2476 2052 a97144af800ff333f4b8a0361d791087.exe 31 PID 2052 wrote to memory of 2476 2052 a97144af800ff333f4b8a0361d791087.exe 31 PID 2052 wrote to memory of 2476 2052 a97144af800ff333f4b8a0361d791087.exe 31 PID 2052 wrote to memory of 2476 2052 a97144af800ff333f4b8a0361d791087.exe 31 PID 2052 wrote to memory of 2476 2052 a97144af800ff333f4b8a0361d791087.exe 31 PID 2052 wrote to memory of 2476 2052 a97144af800ff333f4b8a0361d791087.exe 31 PID 2052 wrote to memory of 568 2052 a97144af800ff333f4b8a0361d791087.exe 32 PID 2052 wrote to memory of 568 2052 a97144af800ff333f4b8a0361d791087.exe 32 PID 2052 wrote to memory of 568 2052 a97144af800ff333f4b8a0361d791087.exe 32 PID 2052 wrote to memory of 568 2052 a97144af800ff333f4b8a0361d791087.exe 32 PID 568 wrote to memory of 820 568 cmd.exe 34 PID 568 wrote to memory of 820 568 cmd.exe 34 PID 568 wrote to memory of 820 568 cmd.exe 34 PID 568 wrote to memory of 820 568 cmd.exe 34 PID 2476 wrote to memory of 2052 2476 a97144af800ff333f4b8a0361d791087.exe 27 PID 2476 wrote to memory of 2052 2476 a97144af800ff333f4b8a0361d791087.exe 27 PID 2476 wrote to memory of 2052 2476 a97144af800ff333f4b8a0361d791087.exe 27 PID 2476 wrote to memory of 2052 2476 a97144af800ff333f4b8a0361d791087.exe 27 PID 2476 wrote to memory of 2052 2476 a97144af800ff333f4b8a0361d791087.exe 27 PID 2476 wrote to memory of 2052 2476 a97144af800ff333f4b8a0361d791087.exe 27 PID 2476 wrote to memory of 2052 2476 a97144af800ff333f4b8a0361d791087.exe 27 PID 2476 wrote to memory of 2052 2476 a97144af800ff333f4b8a0361d791087.exe 27 PID 2476 wrote to memory of 2052 2476 a97144af800ff333f4b8a0361d791087.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe"C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe"C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2476
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\PEVerify.exe" "C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe" & exit2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Roaming\PEVerify.exe"C:\Users\Admin\AppData\Roaming\PEVerify.exe" "C:\Users\Admin\AppData\Local\Temp\a97144af800ff333f4b8a0361d791087.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7D266D9E1E69FA1EEFB9699B009B34C8_1D5A876A9113EC07224C45E5A870E3BD
Filesize5B
MD55bfa51f3a417b98e7443eca90fc94703
SHA18c015d80b8a23f780bdd215dc842b0f5551f63bd
SHA256bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128
SHA5124cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399
-
Filesize
381B
MD51e4a89b11eae0fcf8bb5fdd5ec3b6f61
SHA14260284ce14278c397aaf6f389c1609b0ab0ce51
SHA2564bb79dcea0a901f7d9eac5aa05728ae92acb42e0cb22e5dd14134f4421a3d8df
SHA5128c290919e456a80d87dd6d243e4713945432b9a2bc158bfa5b81ae9fed1a8dd693da51914fa4014c5b8596e36186a9c891741c3b9011958c7ac240b7d818f815
-
Filesize
4B
MD5c8067ad1937f728f51288b3eb986afaa
SHA12773b3399512236d16b9be785202a7232ed84150
SHA2561395d0b76b56509da2cd59c06ca9522cc2b7aff483dcd622b507c21e74613278
SHA5121956f4c604063f0e77d0cd37686f3c9c6f2f797fd62368a2ade7680b351767116e31296304b7d5547788303b05ad7d8d5f87a2d35806432a4e202653c9d81bbd
-
Filesize
59B
MD5903bc0b85fb3242bd00462af69a6b34e
SHA120d8d42695d74cae9a05d04978ef79e015fc887c
SHA256e9d122b170c38b2fe8dc1855b347d00cce07c7718d23516ffa9e1a637c6fcb89
SHA5121ed4e6622cf36b361b10446377db746d45d26ce2c89d7ab13451107040d9cb7982cad2a810d23d737d49364c5b762ccfa54c74e6481c5cab70c509c618d119fb
-
Filesize
53KB
MD56c93f0cc87ec29681dc4c92eed621884
SHA195c432cabca506dc9ce77d2eb36a820a9c706b2e
SHA256f7a659e450b6f82939e4e48436abff93788bdd41b0a4b34d25d72f24a3e24d1b
SHA512dde8fa67890bdc07deb86b6e10b9cf773ac6bb3f0315de19cc67df2a6443d88d40e2a932a13e357c7d311863a495a88c20b2a034ba0a7862fe76893bf9c6427d