Analysis
-
max time kernel
146s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 02:36
Behavioral task
behavioral1
Sample
0be141f64e70b88b08e6490d01718fa2.exe
Resource
win7-20231215-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
0be141f64e70b88b08e6490d01718fa2.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
0be141f64e70b88b08e6490d01718fa2.exe
-
Size
16.2MB
-
MD5
0be141f64e70b88b08e6490d01718fa2
-
SHA1
9c32e1097013547d26b43470d5f0d862d058c09a
-
SHA256
cefdef740c48781321a1d5ea1fb2e13f4b5a2c8858986b2afef44de8af51e8eb
-
SHA512
7075fccf785cf58fb1b9e12099b7cc2bdb9600225aa25b7448011bd81ae9995227be6441231c26abbadc091f0eb29c526367a268bdf60f359a393dea35b2da37
-
SSDEEP
24576:cVU777777777yplplplplplplplplplpr:cn
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1632 cdfxbmg.exe -
resource yara_rule behavioral2/memory/4400-0-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/1632-56-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/1632-39-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/4400-57-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/4400-58-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/4400-59-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/4400-60-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/4400-61-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/4400-62-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/4400-63-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/memory/4400-64-0x0000000000400000-0x000000000046D000-memory.dmp upx -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\Help\1.istljvi 0be141f64e70b88b08e6490d01718fa2.exe File created C:\Windows\SysWOW64\Help\2.istljvi 0be141f64e70b88b08e6490d01718fa2.exe File created C:\Windows\SysWOW64\istljvi\istljvi\kcdvusi\m.ini 0be141f64e70b88b08e6490d01718fa2.exe File created C:\Windows\SysWOW64\istljvi\istljvi\kcdvusi\cdfxbmg.exe 0be141f64e70b88b08e6490d01718fa2.exe File opened for modification C:\Windows\SysWOW64\istljvi\istljvi\kcdvusi\cdfxbmg.exe 0be141f64e70b88b08e6490d01718fa2.exe File created C:\Windows\system32\spool\DRIVERS\W32X86\3\stljvii\stljvii.exe 0be141f64e70b88b08e6490d01718fa2.exe File created C:\Windows\SysWOW64\Help\upbiran.ini 0be141f64e70b88b08e6490d01718fa2.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Help\istljvi.hlp 0be141f64e70b88b08e6490d01718fa2.exe File created C:\Windows\2.ini 0be141f64e70b88b08e6490d01718fa2.exe File opened for modification C:\Windows\ 0be141f64e70b88b08e6490d01718fa2.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4400 0be141f64e70b88b08e6490d01718fa2.exe 4400 0be141f64e70b88b08e6490d01718fa2.exe 4400 0be141f64e70b88b08e6490d01718fa2.exe 4400 0be141f64e70b88b08e6490d01718fa2.exe 4400 0be141f64e70b88b08e6490d01718fa2.exe 4400 0be141f64e70b88b08e6490d01718fa2.exe 4400 0be141f64e70b88b08e6490d01718fa2.exe 4400 0be141f64e70b88b08e6490d01718fa2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4400 0be141f64e70b88b08e6490d01718fa2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4400 wrote to memory of 1632 4400 0be141f64e70b88b08e6490d01718fa2.exe 94 PID 4400 wrote to memory of 1632 4400 0be141f64e70b88b08e6490d01718fa2.exe 94 PID 4400 wrote to memory of 1632 4400 0be141f64e70b88b08e6490d01718fa2.exe 94 PID 1632 wrote to memory of 3228 1632 cdfxbmg.exe 95 PID 1632 wrote to memory of 3228 1632 cdfxbmg.exe 95 PID 1632 wrote to memory of 3228 1632 cdfxbmg.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0be141f64e70b88b08e6490d01718fa2.exe"C:\Users\Admin\AppData\Local\Temp\0be141f64e70b88b08e6490d01718fa2.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\istljvi\istljvi\kcdvusi\cdfxbmg.exeC:\Windows\system32\istljvi\istljvi\kcdvusi\cdfxbmg.exe -close2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\svchost.exesvchost.exe -NetworkService3⤵PID:3228
-
-