Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 01:34
Static task
static1
Behavioral task
behavioral1
Sample
0a37ecfea5074fff2de431e643e74af0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a37ecfea5074fff2de431e643e74af0.exe
Resource
win10v2004-20231215-en
General
-
Target
0a37ecfea5074fff2de431e643e74af0.exe
-
Size
693KB
-
MD5
0a37ecfea5074fff2de431e643e74af0
-
SHA1
4ff3dfa39ae7fd46772c30ff547ed935e134396f
-
SHA256
114ad38ef50939dbc71a24923dff65aad0167b7679805d3c3a5a2fd4b6925247
-
SHA512
7ee5854e7e3cebf76de910b47f427095c420cd27c227d74cd0c62e44f2adfc429c1abb02391cc7ca15df28a99ce471c4912d4a41fc43e234d78029f330f3c33f
-
SSDEEP
12288:tSIzbMSwyUI2buNNqwfVsQV2wWU4dh2hPnmrTVr5i38VeUbBxjv:tSibMSws2SqwGuZUgz3kXjv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2668 0a37ecfea5074fff2de431e643e74af0.exe -
Loads dropped DLL 1 IoCs
pid Process 1220 0a37ecfea5074fff2de431e643e74af0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\sidebar = "C:\\Users\\Admin\\AppData\\Roaming\\Sample.lnk" 0a37ecfea5074fff2de431e643e74af0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1220 set thread context of 2668 1220 0a37ecfea5074fff2de431e643e74af0.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1220 0a37ecfea5074fff2de431e643e74af0.exe 1220 0a37ecfea5074fff2de431e643e74af0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2668 0a37ecfea5074fff2de431e643e74af0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1220 0a37ecfea5074fff2de431e643e74af0.exe Token: SeDebugPrivilege 2668 0a37ecfea5074fff2de431e643e74af0.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2384 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2668 0a37ecfea5074fff2de431e643e74af0.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2244 1220 0a37ecfea5074fff2de431e643e74af0.exe 28 PID 1220 wrote to memory of 2244 1220 0a37ecfea5074fff2de431e643e74af0.exe 28 PID 1220 wrote to memory of 2244 1220 0a37ecfea5074fff2de431e643e74af0.exe 28 PID 1220 wrote to memory of 2244 1220 0a37ecfea5074fff2de431e643e74af0.exe 28 PID 1220 wrote to memory of 2748 1220 0a37ecfea5074fff2de431e643e74af0.exe 30 PID 1220 wrote to memory of 2748 1220 0a37ecfea5074fff2de431e643e74af0.exe 30 PID 1220 wrote to memory of 2748 1220 0a37ecfea5074fff2de431e643e74af0.exe 30 PID 1220 wrote to memory of 2748 1220 0a37ecfea5074fff2de431e643e74af0.exe 30 PID 1220 wrote to memory of 2668 1220 0a37ecfea5074fff2de431e643e74af0.exe 33 PID 1220 wrote to memory of 2668 1220 0a37ecfea5074fff2de431e643e74af0.exe 33 PID 1220 wrote to memory of 2668 1220 0a37ecfea5074fff2de431e643e74af0.exe 33 PID 1220 wrote to memory of 2668 1220 0a37ecfea5074fff2de431e643e74af0.exe 33 PID 1220 wrote to memory of 2668 1220 0a37ecfea5074fff2de431e643e74af0.exe 33 PID 1220 wrote to memory of 2668 1220 0a37ecfea5074fff2de431e643e74af0.exe 33 PID 1220 wrote to memory of 2668 1220 0a37ecfea5074fff2de431e643e74af0.exe 33 PID 1220 wrote to memory of 2668 1220 0a37ecfea5074fff2de431e643e74af0.exe 33 PID 1220 wrote to memory of 2668 1220 0a37ecfea5074fff2de431e643e74af0.exe 33 PID 1220 wrote to memory of 2668 1220 0a37ecfea5074fff2de431e643e74af0.exe 33 PID 1220 wrote to memory of 2668 1220 0a37ecfea5074fff2de431e643e74af0.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a37ecfea5074fff2de431e643e74af0.exe"C:\Users\Admin\AppData\Local\Temp\0a37ecfea5074fff2de431e643e74af0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\CMD.exe"CMD"2⤵PID:2244
-
-
C:\Windows\SysWOW64\CMD.exe"CMD"2⤵PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\0a37ecfea5074fff2de431e643e74af0.exe"C:\Users\Admin\AppData\Local\Temp\0a37ecfea5074fff2de431e643e74af0.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2668
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfbad7c4f2dcf58c8edbe69f42d33456
SHA149aa287a806865aa55741ac279c2208bfbe89118
SHA256ef2b31ec17c9b6774aa672c911874b96d927c0d52c7e8bbb9b7c3f7879047525
SHA51240c44f340a1f38ea28a3ca0f086359815a827da77e4eef3db3b2d787b2ec23cefa10cefe9c2b2bc387bcc18f8b4b995a02619f47e9d3403243425153df2c9977
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
18KB
MD580fb8abb9c3accd6a5040f9d35c4cfba
SHA1856cf9162631fb5b1c3118560b0d20340d95d4a0
SHA2566a81e3a9a8591ac8b6db2636cd0a130b033212848a6118b0217b4e8f1d6d6cee
SHA512d962aaf75641d936da2d532479434ad6452a688859cd38000af51aad72e4a08d4b0c9d618e2ba38aef4316957d47a51049abe988f10f8c077d8de74f2bd39ec8
-
Filesize
693KB
MD50a37ecfea5074fff2de431e643e74af0
SHA14ff3dfa39ae7fd46772c30ff547ed935e134396f
SHA256114ad38ef50939dbc71a24923dff65aad0167b7679805d3c3a5a2fd4b6925247
SHA5127ee5854e7e3cebf76de910b47f427095c420cd27c227d74cd0c62e44f2adfc429c1abb02391cc7ca15df28a99ce471c4912d4a41fc43e234d78029f330f3c33f