Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:40
Static task
static1
Behavioral task
behavioral1
Sample
05e227be18ed6318ca021df46bd10f3b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
05e227be18ed6318ca021df46bd10f3b.exe
Resource
win10v2004-20231215-en
General
-
Target
05e227be18ed6318ca021df46bd10f3b.exe
-
Size
224KB
-
MD5
05e227be18ed6318ca021df46bd10f3b
-
SHA1
46ba7c5ef29fe0322558707479f0c2e0dd0573e0
-
SHA256
21c1474bec216a8e15d1f0073c6801459443e6f6fc205c2114fb63750ccbe4dc
-
SHA512
85606460520e2b6114a3216d21f2bbcced7bfff476f69dba6989a215ff9f90331a160a528377ad518ff0cff3c27625f20278f46678d849f6b78e578e97ab8f58
-
SSDEEP
6144:hGycXOhOwDEVMl/6oy4CVlnfcL5svC7dy5i0kL0lHWsvItvqQOIRtXh0fpdan/HR:h1ldOIRtwan/HD4hzi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2628 artemis.exe -
Loads dropped DLL 2 IoCs
pid Process 2344 05e227be18ed6318ca021df46bd10f3b.exe 2344 05e227be18ed6318ca021df46bd10f3b.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\artemis.exe 05e227be18ed6318ca021df46bd10f3b.exe File opened for modification C:\Windows\SysWOW64\artemis.exe 05e227be18ed6318ca021df46bd10f3b.exe File created C:\Windows\SysWOW64\artemis.exe artemis.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2344 05e227be18ed6318ca021df46bd10f3b.exe Token: SeIncBasePriorityPrivilege 2628 artemis.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2628 2344 05e227be18ed6318ca021df46bd10f3b.exe 16 PID 2344 wrote to memory of 2628 2344 05e227be18ed6318ca021df46bd10f3b.exe 16 PID 2344 wrote to memory of 2628 2344 05e227be18ed6318ca021df46bd10f3b.exe 16 PID 2344 wrote to memory of 2628 2344 05e227be18ed6318ca021df46bd10f3b.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\05e227be18ed6318ca021df46bd10f3b.exe"C:\Users\Admin\AppData\Local\Temp\05e227be18ed6318ca021df46bd10f3b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\artemis.exeC:\Windows\system32\artemis.exe C:\Users\Admin\AppData\Local\Temp\05e227be18ed6318ca021df46bd10f3b.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD505e227be18ed6318ca021df46bd10f3b
SHA146ba7c5ef29fe0322558707479f0c2e0dd0573e0
SHA25621c1474bec216a8e15d1f0073c6801459443e6f6fc205c2114fb63750ccbe4dc
SHA51285606460520e2b6114a3216d21f2bbcced7bfff476f69dba6989a215ff9f90331a160a528377ad518ff0cff3c27625f20278f46678d849f6b78e578e97ab8f58