Analysis
-
max time kernel
143s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
09fd6825f63146c189c1d71d7fc1fc59.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
09fd6825f63146c189c1d71d7fc1fc59.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
09fd6825f63146c189c1d71d7fc1fc59.exe
-
Size
494KB
-
MD5
09fd6825f63146c189c1d71d7fc1fc59
-
SHA1
7fece991077081495925c78f9c01bd70aab5e5b9
-
SHA256
c341dd5eb1bd242ece8a5f5a16884bf8c668a1e240beb8528fe69ba19102dfd0
-
SHA512
15c5161ac384a18cc0cada0f049e985736d168df579f431f7bf9b5b846e97dcf4bcee0f9dfa38c17f674ab4623a9a23c6d029046313ad78696e31c28fc08a265
-
SSDEEP
12288:i1Ra1rN4wopVauKAxZkhwryINtTirdorv3:iDrp4XAx+hwrywTEdo7
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4888 EntSver.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\EntSver.exe 09fd6825f63146c189c1d71d7fc1fc59.exe File opened for modification C:\Windows\EntSver.exe 09fd6825f63146c189c1d71d7fc1fc59.exe File created C:\Windows\GUOCYOKl.BAT 09fd6825f63146c189c1d71d7fc1fc59.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2904 09fd6825f63146c189c1d71d7fc1fc59.exe Token: SeDebugPrivilege 4888 EntSver.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4888 EntSver.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4888 wrote to memory of 2684 4888 EntSver.exe 18 PID 4888 wrote to memory of 2684 4888 EntSver.exe 18 PID 2904 wrote to memory of 3992 2904 09fd6825f63146c189c1d71d7fc1fc59.exe 22 PID 2904 wrote to memory of 3992 2904 09fd6825f63146c189c1d71d7fc1fc59.exe 22 PID 2904 wrote to memory of 3992 2904 09fd6825f63146c189c1d71d7fc1fc59.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\09fd6825f63146c189c1d71d7fc1fc59.exe"C:\Users\Admin\AppData\Local\Temp\09fd6825f63146c189c1d71d7fc1fc59.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\GUOCYOKl.BAT2⤵PID:3992
-
-
C:\Windows\EntSver.exeC:\Windows\EntSver.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2684
-