Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
1d1f0cc55c1934cb95173814c14a21d5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d1f0cc55c1934cb95173814c14a21d5.exe
Resource
win10v2004-20231215-en
General
-
Target
1d1f0cc55c1934cb95173814c14a21d5.exe
-
Size
456KB
-
MD5
1d1f0cc55c1934cb95173814c14a21d5
-
SHA1
8ec40782553dc46ba6bed9302a276f1449e5f4d3
-
SHA256
e12065c75e29bcd1f5a95849ecffa1d4463ee48b21415a32b45cccd80d14be36
-
SHA512
98a996a73c783291282a1c89da7ddcdf299ee000e605b998bec3b67bed093a1efc7b2364c06b4ca0197dea4409405cefdd560e78312f7e66a05cfbc2b88b1bb8
-
SSDEEP
12288:oely6pWtDJWRjPmhZicFCtbZX65wBJy1R/0ZSnvDygsI6yE:ofmWHccZicFCloKbyn0E/sIu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2888 cN01804FnJjF01804.exe -
Executes dropped EXE 1 IoCs
pid Process 2888 cN01804FnJjF01804.exe -
Loads dropped DLL 2 IoCs
pid Process 2880 1d1f0cc55c1934cb95173814c14a21d5.exe 2880 1d1f0cc55c1934cb95173814c14a21d5.exe -
resource yara_rule behavioral1/memory/2880-1-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/2880-17-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/2888-20-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/2888-30-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/2888-40-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\cN01804FnJjF01804 = "C:\\ProgramData\\cN01804FnJjF01804\\cN01804FnJjF01804.exe" cN01804FnJjF01804.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main cN01804FnJjF01804.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2880 1d1f0cc55c1934cb95173814c14a21d5.exe 2880 1d1f0cc55c1934cb95173814c14a21d5.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2880 1d1f0cc55c1934cb95173814c14a21d5.exe Token: SeDebugPrivilege 2888 cN01804FnJjF01804.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2888 cN01804FnJjF01804.exe 2888 cN01804FnJjF01804.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2888 2880 1d1f0cc55c1934cb95173814c14a21d5.exe 28 PID 2880 wrote to memory of 2888 2880 1d1f0cc55c1934cb95173814c14a21d5.exe 28 PID 2880 wrote to memory of 2888 2880 1d1f0cc55c1934cb95173814c14a21d5.exe 28 PID 2880 wrote to memory of 2888 2880 1d1f0cc55c1934cb95173814c14a21d5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d1f0cc55c1934cb95173814c14a21d5.exe"C:\Users\Admin\AppData\Local\Temp\1d1f0cc55c1934cb95173814c14a21d5.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\ProgramData\cN01804FnJjF01804\cN01804FnJjF01804.exe"C:\ProgramData\cN01804FnJjF01804\cN01804FnJjF01804.exe" "C:\Users\Admin\AppData\Local\Temp\1d1f0cc55c1934cb95173814c14a21d5.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD58432c3361182384705c82c4dc1ada409
SHA17ace8a0706e0e680af93d9cb25e4232f0c7b1446
SHA25673214392c9ee2508e51b43d30a48c5041cb7c70a2070cf41c85a8df9bf4f77ab
SHA512c27264dc5c4b66fadcce645b660e89baec3f84e44e43f2fa2ffa4ca542270e3d969f6ae2d5f9e90f9a7a901d96607a869916f32b2e8fac9aa0cde1a027ad80d8
-
Filesize
456KB
MD5d98db5d77a14cb2e798567849ac65bc1
SHA143451c5a0129745ec5156d2adb67a8329cdcf7d1
SHA2561f56be2e9166464fff6c955afb8e08ea7cd2bf3c77442248769d2f498d422b50
SHA512ba943512cc6f6e9132459db1954590c38ed7f566e16af6069ecacafefc6439f994b24aac11e9f4cd79aa58de65b349e78add71642e1f00c01021bbdefb0d2ada