Analysis
-
max time kernel
178s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
08b9d99db62aa26223053dfdab574c6d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
08b9d99db62aa26223053dfdab574c6d.exe
Resource
win10v2004-20231215-en
General
-
Target
08b9d99db62aa26223053dfdab574c6d.exe
-
Size
548KB
-
MD5
08b9d99db62aa26223053dfdab574c6d
-
SHA1
23455e1832dd483085c0fed8f7b48e8b5419d6e9
-
SHA256
000ca1cc7688a32beb371fdaa1e553979eb3ea20ac43e77b3bbd0f979c5001f1
-
SHA512
8df53462634b43335f390f3372837090b35286d6840387c795a450d14c43a5e9ab5a782288d43b2f011bf6303b4e2f29e974ca72582b5522617187002123bd83
-
SSDEEP
12288:3/8uXbKppS5x+bJYHv1v797oEu1c2obY7rbW7OJwjs45D0:P8uXISf+baHN7979MocHy7qqsmQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2192 Hacker.com.cn.ini -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.ini 08b9d99db62aa26223053dfdab574c6d.exe File opened for modification C:\Windows\Hacker.com.cn.ini 08b9d99db62aa26223053dfdab574c6d.exe File created C:\Windows\uninstal.bat 08b9d99db62aa26223053dfdab574c6d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4796 08b9d99db62aa26223053dfdab574c6d.exe Token: SeDebugPrivilege 2192 Hacker.com.cn.ini -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 Hacker.com.cn.ini -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4796 wrote to memory of 3228 4796 08b9d99db62aa26223053dfdab574c6d.exe 94 PID 4796 wrote to memory of 3228 4796 08b9d99db62aa26223053dfdab574c6d.exe 94 PID 4796 wrote to memory of 3228 4796 08b9d99db62aa26223053dfdab574c6d.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\08b9d99db62aa26223053dfdab574c6d.exe"C:\Users\Admin\AppData\Local\Temp\08b9d99db62aa26223053dfdab574c6d.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat2⤵PID:3228
-
-
C:\Windows\Hacker.com.cn.iniC:\Windows\Hacker.com.cn.ini1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2192
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD508b9d99db62aa26223053dfdab574c6d
SHA123455e1832dd483085c0fed8f7b48e8b5419d6e9
SHA256000ca1cc7688a32beb371fdaa1e553979eb3ea20ac43e77b3bbd0f979c5001f1
SHA5128df53462634b43335f390f3372837090b35286d6840387c795a450d14c43a5e9ab5a782288d43b2f011bf6303b4e2f29e974ca72582b5522617187002123bd83
-
Filesize
190B
MD52c3c39492ea4f02c740299c1fc0466a0
SHA197e0b430b59feea31b1e744b8aeb0134c9327c8c
SHA25652279cc365526049676a443518b77a71ff5a05481f6c88b7000099d7e63af754
SHA51245aaecad77def8382e8cdd8921a13901f035827b2476259b431cecfd8e04e34c6b0483094e1e763d9bc557c34cc1db091b6b5afe60e46f6d1a4e9b65d7065238