Analysis
-
max time kernel
135s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
07fc6c133ac30a6fd39a747c98e09587.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07fc6c133ac30a6fd39a747c98e09587.exe
Resource
win10v2004-20231215-en
General
-
Target
07fc6c133ac30a6fd39a747c98e09587.exe
-
Size
246KB
-
MD5
07fc6c133ac30a6fd39a747c98e09587
-
SHA1
8beee3ee4a91a7ad9f5e8a5fc7ad07974cad28e9
-
SHA256
715ba6283712abf979d61dc2c1a43e77f6c97bb12b470d902847eb4c81aeddd8
-
SHA512
86aac09ab7f6ae9ab9ac45f1d9f146bff4fe30cc4ff31258b08faf546fbdfaaf8c540489a39a81b8740455d4edd4edd837793ab56c89744e4f606ba9f0a39946
-
SSDEEP
6144:Z6ufQ0U5eHWmCT6gzro1Ud3XsEElay9ra:MufnHW1JEUdMEElaYr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4368 X -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3132 set thread context of 2824 3132 07fc6c133ac30a6fd39a747c98e09587.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4368 X 4368 X -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3444 Explorer.EXE 3444 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3444 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3132 wrote to memory of 2824 3132 07fc6c133ac30a6fd39a747c98e09587.exe 88 PID 3132 wrote to memory of 2824 3132 07fc6c133ac30a6fd39a747c98e09587.exe 88 PID 3132 wrote to memory of 2824 3132 07fc6c133ac30a6fd39a747c98e09587.exe 88 PID 3132 wrote to memory of 4368 3132 07fc6c133ac30a6fd39a747c98e09587.exe 89 PID 3132 wrote to memory of 4368 3132 07fc6c133ac30a6fd39a747c98e09587.exe 89 PID 4368 wrote to memory of 3444 4368 X 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\07fc6c133ac30a6fd39a747c98e09587.exe"C:\Users\Admin\AppData\Local\Temp\07fc6c133ac30a6fd39a747c98e09587.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\explorer.exe00000208*3⤵PID:2824
-
-
C:\Users\Admin\AppData\Local\ad0c643d\X193.105.154.210:803⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4368
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5686b479b0ee164cf1744a8be359ebb7d
SHA18615e8f967276a85110b198d575982a958581a07
SHA256fcfbb4c648649f4825b66504b261f912227ba32cbaabcadf4689020a83fb201b
SHA5127ed8022e2b09f232150b77fc3a25269365b624f19f0b50c46a4fdf744eeb23294c09c051452c4c9dbb34a274f1a0bfc54b3ff1987ec16ae2e54848e22a97ed64