Analysis
-
max time kernel
180s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
0b20b738554bb4278c3cd051bbee9343.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b20b738554bb4278c3cd051bbee9343.exe
Resource
win10v2004-20231215-en
General
-
Target
0b20b738554bb4278c3cd051bbee9343.exe
-
Size
669KB
-
MD5
0b20b738554bb4278c3cd051bbee9343
-
SHA1
bf4282db33611719203e18bdd31d54821d57b967
-
SHA256
1785763263ce7db051dd49855a756da20ed9d9d25f62215fd383460aaf98e665
-
SHA512
6a03b5b3998d138044186665ca2f0e393ed53f21244745b3e891192660e47256a4240205a2980a53a5fa738ed65237ce4626ffc437c2c536584c172f417b0683
-
SSDEEP
12288:lcMQfeS+Eln95O5m8fPrdHFRRwlkVxENYWo1F3Z4mxxxEO6YPXTF8ews7:lpw/+q95O5m2tzGlMEqWcQmXxh6YPXTP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1660 Hacker.com.cn.exe -
Loads dropped DLL 4 IoCs
pid Process 1660 Hacker.com.cn.exe 1660 Hacker.com.cn.exe 1660 Hacker.com.cn.exe 1660 Hacker.com.cn.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe 0b20b738554bb4278c3cd051bbee9343.exe File opened for modification C:\Windows\Hacker.com.cn.exe 0b20b738554bb4278c3cd051bbee9343.exe File created C:\Windows\VIUTOG.DAT 0b20b738554bb4278c3cd051bbee9343.exe File created C:\Windows\VQYIOQ.DAT 0b20b738554bb4278c3cd051bbee9343.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 784 0b20b738554bb4278c3cd051bbee9343.exe Token: SeDebugPrivilege 1660 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1660 Hacker.com.cn.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1660 Hacker.com.cn.exe 1660 Hacker.com.cn.exe 1660 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1876 1660 Hacker.com.cn.exe 94 PID 1660 wrote to memory of 1876 1660 Hacker.com.cn.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b20b738554bb4278c3cd051bbee9343.exe"C:\Users\Admin\AppData\Local\Temp\0b20b738554bb4278c3cd051bbee9343.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:784
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1876
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
669KB
MD50b20b738554bb4278c3cd051bbee9343
SHA1bf4282db33611719203e18bdd31d54821d57b967
SHA2561785763263ce7db051dd49855a756da20ed9d9d25f62215fd383460aaf98e665
SHA5126a03b5b3998d138044186665ca2f0e393ed53f21244745b3e891192660e47256a4240205a2980a53a5fa738ed65237ce4626ffc437c2c536584c172f417b0683
-
Filesize
51KB
MD5d58f992c53515c9f1fb9394a46f4cb48
SHA11f9909d227b93be10328e0abc64052da984657ba
SHA25650c6b8848b0a9cf6a6b579928dc6e5c75cf7564c19bb7b40d86ba9d360ebb040
SHA5123a87c279fbbbaff2bfe791c523716ad092c41099b8914ba369565014502d408084259d4efe6896d785c024935b181ca34cf49e3b79f3f1a89ee1c9d775635d94
-
Filesize
55KB
MD56853cba3ccc11699c2d840f41c10393f
SHA180a430dcc2cb34b05d433f0f63b8ef8a6a09bbe3
SHA2560bcf3f4ff7862cd885003b8ecc4d424a2fd418fd64412ffe95a9c4221cc3de59
SHA512a02fef8b7c721459fa6f081a1208bf8dd84d957663b4d711b9f6f1731deedf977e5a391ec7481797da7a594c3dd133e84865133855dcdbe6da2128887270114c