Analysis
-
max time kernel
161s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
09c44485af177aa1bb76fea91191330c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09c44485af177aa1bb76fea91191330c.exe
Resource
win10v2004-20231215-en
General
-
Target
09c44485af177aa1bb76fea91191330c.exe
-
Size
354KB
-
MD5
09c44485af177aa1bb76fea91191330c
-
SHA1
a63703680517936c3d0a6821e78fb046cafe721a
-
SHA256
41b9b1489cc9c5df2cd33eb4f9292710b25c0072299d81d2c58c75b2296cfa70
-
SHA512
8638a3a9de27c1de9a4f011e99383305d7274374b5807ba21f7abc55784d643855add0be4655cf0c97a8c60205577e236cf11324c9c4214ae18cc463a6b8fa73
-
SSDEEP
6144:X+nkuDHol98+X3AnyxAtr2dDyqBpHu2OmkhPu/FLohiQctoDd9ijquYCMB:unkJl9vXQyxAtKdDyqfH5Ojh2QR2jzhM
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4872 SERVER~1.EXE 2368 Hacker.com.cn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 09c44485af177aa1bb76fea91191330c.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\uninstal.bat SERVER~1.EXE File created C:\Windows\Hacker.com.cn.exe SERVER~1.EXE File opened for modification C:\Windows\Hacker.com.cn.exe SERVER~1.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4872 SERVER~1.EXE Token: SeDebugPrivilege 2368 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1836 wrote to memory of 4872 1836 09c44485af177aa1bb76fea91191330c.exe 96 PID 1836 wrote to memory of 4872 1836 09c44485af177aa1bb76fea91191330c.exe 96 PID 1836 wrote to memory of 4872 1836 09c44485af177aa1bb76fea91191330c.exe 96 PID 4872 wrote to memory of 4512 4872 SERVER~1.EXE 99 PID 4872 wrote to memory of 4512 4872 SERVER~1.EXE 99 PID 4872 wrote to memory of 4512 4872 SERVER~1.EXE 99 PID 2368 wrote to memory of 4152 2368 Hacker.com.cn.exe 98 PID 2368 wrote to memory of 4152 2368 Hacker.com.cn.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\09c44485af177aa1bb76fea91191330c.exe"C:\Users\Admin\AppData\Local\Temp\09c44485af177aa1bb76fea91191330c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat3⤵PID:4512
-
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293KB
MD5d74072ab5ed37c3e9105eb94b677e1ad
SHA1a880c968426889592fa4c29596c27f1de4672dbd
SHA256049b0fd88d0322bf7d20a90b14b6a7a9db33e54a35d9dd4ac4523791b424b6c2
SHA51278687e58e7283ef8a1349211ea6578201a220b3f084b6903ae435c3475b33a596adad2d02212585adb250bf6bed27efc00e45d8cf4df73cc77e4613f41598e2d
-
Filesize
164B
MD5924ea7ae6df752587469376459875c51
SHA1ec5fa69c7e5dcaf5b57eefadc4f25a8e4ae073e1
SHA25646c715ac82d5774479b760757498ddb0b9f75cebc116a3da81f9e438bc9bbb09
SHA512ea7b176a411b82faf5fcd785c67180f88f9ff28f7e24c4f4b49f8e7cdc99fb60e38722b61547a4291bdd2c56b3729045c2e8d4afbecfe03612ab0dd8a7b6ae35