Analysis
-
max time kernel
144s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
0b20b738554bb4278c3cd051bbee9343.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b20b738554bb4278c3cd051bbee9343.exe
Resource
win10v2004-20231215-en
General
-
Target
0b20b738554bb4278c3cd051bbee9343.exe
-
Size
669KB
-
MD5
0b20b738554bb4278c3cd051bbee9343
-
SHA1
bf4282db33611719203e18bdd31d54821d57b967
-
SHA256
1785763263ce7db051dd49855a756da20ed9d9d25f62215fd383460aaf98e665
-
SHA512
6a03b5b3998d138044186665ca2f0e393ed53f21244745b3e891192660e47256a4240205a2980a53a5fa738ed65237ce4626ffc437c2c536584c172f417b0683
-
SSDEEP
12288:lcMQfeS+Eln95O5m8fPrdHFRRwlkVxENYWo1F3Z4mxxxEO6YPXTF8ews7:lpw/+q95O5m2tzGlMEqWcQmXxh6YPXTP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 Hacker.com.cn.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Hacker.com.cn.exe 0b20b738554bb4278c3cd051bbee9343.exe File created C:\Windows\YRTCOV.DAT 0b20b738554bb4278c3cd051bbee9343.exe File created C:\Windows\HYYZUC.DAT 0b20b738554bb4278c3cd051bbee9343.exe File created C:\Windows\Hacker.com.cn.exe 0b20b738554bb4278c3cd051bbee9343.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2856 0b20b738554bb4278c3cd051bbee9343.exe Token: SeDebugPrivilege 2744 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2744 Hacker.com.cn.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2744 Hacker.com.cn.exe 2744 Hacker.com.cn.exe 2744 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2868 2744 Hacker.com.cn.exe 28 PID 2744 wrote to memory of 2868 2744 Hacker.com.cn.exe 28 PID 2744 wrote to memory of 2868 2744 Hacker.com.cn.exe 28 PID 2744 wrote to memory of 2868 2744 Hacker.com.cn.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b20b738554bb4278c3cd051bbee9343.exe"C:\Users\Admin\AppData\Local\Temp\0b20b738554bb4278c3cd051bbee9343.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"1⤵PID:2868
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD557357e03cca82990ea5513f18d378539
SHA1223a7b1bd090efe7f6de3f95f69cdf18e7d6ef3d
SHA256005f009e1da40e2978cfdd7a4fb4b7a8e9a67ee2e12415c672e270352d0db3d2
SHA51276b02a5f2100f1bdfbc045449f7f218bc5afae35410ba156b048c53f28b4ef023ffeffc83e21ad66cfeba44c7500fc16039d9ba7e76ab2c7f40037e6567bd810
-
Filesize
58KB
MD5bb978c9814489a96be20c27da759ba6e
SHA1a9b7aff36c2ef27b8c0e2af68d35fd50a621fe65
SHA2567716f4ccd41e014409b4cb2cc836070791918d71a09ebe982f42590561b25512
SHA512abae4c79054764b8dda2bbe024f20b7ab42e2e37feec2cc499a15b4e6892127cc47c2a7ad5b80c8188989f231614d2bb068f7bb7c37969bcd967abcb8b9cf75e
-
Filesize
22KB
MD574e535f9ec108d6158ec00d07baef028
SHA102e13fff9b5390cf0c49fa915c59aa77170cde1a
SHA25620aa09e4757f5af9885b83cfdd832364ef3ee19ff6f2efa0d6256932bad9b077
SHA5129528d0f656ce6ab123986d2a578a17f89f7ca2177551c556019f70f22d837e35f9d4381890faf02c6a597c2b5702356eb9ba46ce6411cc9ae1aac84f96f1189b
-
Filesize
51KB
MD5d58f992c53515c9f1fb9394a46f4cb48
SHA11f9909d227b93be10328e0abc64052da984657ba
SHA25650c6b8848b0a9cf6a6b579928dc6e5c75cf7564c19bb7b40d86ba9d360ebb040
SHA5123a87c279fbbbaff2bfe791c523716ad092c41099b8914ba369565014502d408084259d4efe6896d785c024935b181ca34cf49e3b79f3f1a89ee1c9d775635d94