Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
061e5aaf555483b8e5a988c558c30367.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
061e5aaf555483b8e5a988c558c30367.exe
Resource
win10v2004-20231222-en
General
-
Target
061e5aaf555483b8e5a988c558c30367.exe
-
Size
648KB
-
MD5
061e5aaf555483b8e5a988c558c30367
-
SHA1
8799f3097e645d42dcb2ae50996cd25080872b22
-
SHA256
8af99a59b35ef3a94aa5b2f8c621de87e58b63470c6310367331822abe38140c
-
SHA512
1d21d991c80a5488d5ad3dd83bade9d42ae741756453ada78a50e54ae020178813af7155c2ac9f98434bcde2d536800b813ea13019a733be48b4e90dc70b479e
-
SSDEEP
12288:i3lOzTVqfEgr5vW5AQl3BP4XZMZZMtT/TVhoEgZKL5FBlVvOcEEmH6+7+fc:i3I3dg9vW5AQfYqv4TVhoEgGvOcEE2f
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1672 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2292 win xp.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\win xp.exe 061e5aaf555483b8e5a988c558c30367.exe File opened for modification C:\Windows\win xp.exe 061e5aaf555483b8e5a988c558c30367.exe File created C:\Windows\Delete.bat 061e5aaf555483b8e5a988c558c30367.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet win xp.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm win xp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm\wheel = "1" win xp.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm win xp.exe Key created \REGISTRY\USER\.DEFAULT\System win xp.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control win xp.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties win xp.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties win xp.exe Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick win xp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2644 061e5aaf555483b8e5a988c558c30367.exe Token: SeDebugPrivilege 2292 win xp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 win xp.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2836 2292 win xp.exe 29 PID 2292 wrote to memory of 2836 2292 win xp.exe 29 PID 2292 wrote to memory of 2836 2292 win xp.exe 29 PID 2292 wrote to memory of 2836 2292 win xp.exe 29 PID 2644 wrote to memory of 1672 2644 061e5aaf555483b8e5a988c558c30367.exe 30 PID 2644 wrote to memory of 1672 2644 061e5aaf555483b8e5a988c558c30367.exe 30 PID 2644 wrote to memory of 1672 2644 061e5aaf555483b8e5a988c558c30367.exe 30 PID 2644 wrote to memory of 1672 2644 061e5aaf555483b8e5a988c558c30367.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\061e5aaf555483b8e5a988c558c30367.exe"C:\Users\Admin\AppData\Local\Temp\061e5aaf555483b8e5a988c558c30367.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Delete.bat2⤵
- Deletes itself
PID:1672
-
-
C:\Windows\win xp.exe"C:\Windows\win xp.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2836
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186B
MD543957ff77b34a3606ec5fe59f1c1610f
SHA1c0fd2fdeb6f2a5b3178e2189499111605a0df48a
SHA256b144083aac042ec1a3801faa889ba05e174edd683cf8c04d88dc9d740705ef3d
SHA5123066ce4f049c6a1561a3a0ffc29264bc77d7559ffd5bd088fa3633b81a26ac8f9ac58630ac9af128ec58e673f6b3876a3fd9717aea829fe493cc5bcb9cf51fcc
-
Filesize
648KB
MD5061e5aaf555483b8e5a988c558c30367
SHA18799f3097e645d42dcb2ae50996cd25080872b22
SHA2568af99a59b35ef3a94aa5b2f8c621de87e58b63470c6310367331822abe38140c
SHA5121d21d991c80a5488d5ad3dd83bade9d42ae741756453ada78a50e54ae020178813af7155c2ac9f98434bcde2d536800b813ea13019a733be48b4e90dc70b479e