Analysis
-
max time kernel
191s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
9201e8a64cf8dc894ef7d939f276d72161b8ec010392192248d5536f3048b080.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9201e8a64cf8dc894ef7d939f276d72161b8ec010392192248d5536f3048b080.exe
Resource
win10v2004-20231215-en
General
-
Target
9201e8a64cf8dc894ef7d939f276d72161b8ec010392192248d5536f3048b080.exe
-
Size
705KB
-
MD5
ee024430c73bc4308643ebd61615b96d
-
SHA1
dce5fafb260f6da86834da9649fe93e2d0911c39
-
SHA256
9201e8a64cf8dc894ef7d939f276d72161b8ec010392192248d5536f3048b080
-
SHA512
31a1689848d5fb1c2acd65d835b645a1489d20c191ab7f8723a1ef17751cdb5899d4223a92b3a98017e7690a4355e36146196e1a6c8d8d1f5278a9950685997b
-
SSDEEP
12288:cW9B+VhFCrNDFKYmKIiirRGW2phzrvXuayM1J3AAlrAf0d83QC0OXxcpGHMki:cW9B28NDFKYmKOF0zr31JwAlcR3QC0O3
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 3264 alg.exe 4628 elevation_service.exe 2096 elevation_service.exe 2708 maintenanceservice.exe 1300 OSE.EXE -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 9201e8a64cf8dc894ef7d939f276d72161b8ec010392192248d5536f3048b080.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\7a23c77314007a37.bin alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe alg.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe alg.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe alg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 536 9201e8a64cf8dc894ef7d939f276d72161b8ec010392192248d5536f3048b080.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9201e8a64cf8dc894ef7d939f276d72161b8ec010392192248d5536f3048b080.exe"C:\Users\Admin\AppData\Local\Temp\9201e8a64cf8dc894ef7d939f276d72161b8ec010392192248d5536f3048b080.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:536
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
PID:3264
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4628
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2096
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2708
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1300
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
945KB
MD5885922e22e4afca9cafbbbdc3dcb29c3
SHA18d8666ceff1b9298515942d3dc879afd515ca566
SHA256c5eccb649efc65c9631c7e3012e89e090ad9469cafcf233c5afa90e50fee32b6
SHA51246e17c199c90b16ae212dafe01ba9ad6cb6d39bf6848c3a5886be44e3f1c43985e04777308b0ea6aa65f5ea0fad2e96e53222abf342d3b8e51ccd9c91d4ebdf3
-
Filesize
74KB
MD56c2104ae5de35fe9a349e54fee9469fd
SHA16173f2b0752f4fb3585c60f8e1fba27bdce966c2
SHA256c26eaef5ae722d7226e179b82aeb7020934f9e6fd2674f9a9c60eff0a64ed61f
SHA512b4976410bbacce6be014e1f0b97ff25741698b7bf63166efb6723bb6af7000bd6ddfb41d24b648a729794f2793dff001092ec7b09be6ac7a74ae6de1d836c693
-
Filesize
805KB
MD56aaad847b03f7cfc8d7f9921eea824a3
SHA1a5d7ccc4073be97e449d04cf8c1f1b92d6c0347d
SHA256da62aeabb0dea94bce3f3422b5c0c103f8444953bbf159a29b2ff1a750655bf3
SHA512b7761bcb7d9a0d1ead451277fbf800a52db87b7f50d4f4a9e525379a60749414d7728bd7b0de6d26a112131ae0c27e4b9b1038458069387d5a43b5f16e387c3a
-
Filesize
114KB
MD5f472193a069289c680ba8ad641f5b68b
SHA11d56d060f9cd96e1748a27f4763329dbb976bea8
SHA256cbcab713ff8aff29b9ffa1e54bfaf71977926f826aeb8fc676121105d0c1acc2
SHA512a5b2f9bd46d757dd381f916d4de4511ea1a26dd94bd2574a02666b69acd22e0511c6d05dd5a2d4810313d2b02dfeb7a37eb542ed125e21fac5d183a78a78ac56
-
Filesize
175KB
MD5ec58380a78dd9e9732ec8e0fea750d1d
SHA1027b3cdf09208ba4156ecce43c0c5c0335d99f68
SHA25659a48a0b73afd3743366644b75800a5548248dbbfbbffb984b810f9e1dc210a7
SHA5120364639c38d48b036363b99383c6ccfd428f932fa14d25985da785ab4448677b325c030cb45fa3b4abba9c7c9ba0a1a83a0fe531bcf7d29ce6d64a475cce1ebc