Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:43
Behavioral task
behavioral1
Sample
021d6be5015380cc61c56da5fb3b173c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
021d6be5015380cc61c56da5fb3b173c.exe
Resource
win10v2004-20231222-en
General
-
Target
021d6be5015380cc61c56da5fb3b173c.exe
-
Size
33KB
-
MD5
021d6be5015380cc61c56da5fb3b173c
-
SHA1
716e2d8f327a1568a8b46fbe561ed133f93b41b6
-
SHA256
27eb2029de50366fb6245e623c8eda3a811e1017f2a3b05e4b57a693d9647a6c
-
SHA512
0f1328d2b8c3e9ab1bd3b64ee060b51e82537acd88b9bbd95235f53a54cdb6fbc8dfbee48c6f6c722166116df92b9a1d8646a719b1df00e6d8db560102fb6b67
-
SSDEEP
768:DFnlhFtR4zrvmdqHoW3EzrEPekAUaB2K0:DhDoLmdKoW3Ezrdk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1640 96036948-0.exe -
Loads dropped DLL 2 IoCs
pid Process 2868 021d6be5015380cc61c56da5fb3b173c.exe 2868 021d6be5015380cc61c56da5fb3b173c.exe -
resource yara_rule behavioral1/memory/2868-0-0x0000000000B70000-0x0000000000BAC000-memory.dmp upx behavioral1/files/0x000b0000000139e0-7.dat upx behavioral1/memory/1640-15-0x0000000001320000-0x000000000135C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update Server = "C:\\Users\\Admin\\96036948-0.exe" 021d6be5015380cc61c56da5fb3b173c.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 96036948-0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier 96036948-0.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 021d6be5015380cc61c56da5fb3b173c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier 021d6be5015380cc61c56da5fb3b173c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1640 96036948-0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2868 021d6be5015380cc61c56da5fb3b173c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2868 021d6be5015380cc61c56da5fb3b173c.exe Token: SeDebugPrivilege 1640 96036948-0.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2868 wrote to memory of 1640 2868 021d6be5015380cc61c56da5fb3b173c.exe 28 PID 2868 wrote to memory of 1640 2868 021d6be5015380cc61c56da5fb3b173c.exe 28 PID 2868 wrote to memory of 1640 2868 021d6be5015380cc61c56da5fb3b173c.exe 28 PID 2868 wrote to memory of 1640 2868 021d6be5015380cc61c56da5fb3b173c.exe 28 PID 1640 wrote to memory of 1212 1640 96036948-0.exe 14
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\021d6be5015380cc61c56da5fb3b173c.exe"C:\Users\Admin\AppData\Local\Temp\021d6be5015380cc61c56da5fb3b173c.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Enumerates system info in registry
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\96036948-0.exe"C:\Users\Admin\96036948-0.exe"3⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5021d6be5015380cc61c56da5fb3b173c
SHA1716e2d8f327a1568a8b46fbe561ed133f93b41b6
SHA25627eb2029de50366fb6245e623c8eda3a811e1017f2a3b05e4b57a693d9647a6c
SHA5120f1328d2b8c3e9ab1bd3b64ee060b51e82537acd88b9bbd95235f53a54cdb6fbc8dfbee48c6f6c722166116df92b9a1d8646a719b1df00e6d8db560102fb6b67