Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
0c7acffd58137e90a8fb504249be8053.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c7acffd58137e90a8fb504249be8053.exe
Resource
win10v2004-20231215-en
General
-
Target
0c7acffd58137e90a8fb504249be8053.exe
-
Size
11KB
-
MD5
0c7acffd58137e90a8fb504249be8053
-
SHA1
1103049c2f83155ccdbad9cfa48093c05e16f9f0
-
SHA256
65baea29610aae6289023b7d91beae03eaab7e541ee2e01ce9c1684af12cacf7
-
SHA512
c6eaf43cb8b97ec6827c685b7356264362214ffb98cd8f0bbc6f154d54ff2f88503ae392d9934d471d2415087eb00466abfa7a68ae37c80655724f7b0b1c356a
-
SSDEEP
192:IORbT9O1s9wn6kYAr6+JHGhJ95/YaY4taJJgVfJU5li0bZQs9oOAac:RO1s+6kYAWkc95/Fo8Bu5L+B1n
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2672 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2824 RAVQQHXMON.exe -
Loads dropped DLL 2 IoCs
pid Process 3052 0c7acffd58137e90a8fb504249be8053.exe 3052 0c7acffd58137e90a8fb504249be8053.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\RAVQQHXMON = "C:\\Program Files\\Internet Explorer\\RAVQQHXMON.exe" RAVQQHXMON.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\RAVQQHXMON.exe 0c7acffd58137e90a8fb504249be8053.exe File created C:\Program Files\Internet Explorer\RAVQQHXMON.exe 0c7acffd58137e90a8fb504249be8053.exe File opened for modification C:\Program Files\Internet Explorer\RAVQQHXMON.DAT RAVQQHXMON.exe File created C:\Program Files\Internet Explorer\RAVQQHXMON.DAT RAVQQHXMON.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3052 0c7acffd58137e90a8fb504249be8053.exe 2824 RAVQQHXMON.exe 2824 RAVQQHXMON.exe 2824 RAVQQHXMON.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2824 RAVQQHXMON.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2824 3052 0c7acffd58137e90a8fb504249be8053.exe 28 PID 3052 wrote to memory of 2824 3052 0c7acffd58137e90a8fb504249be8053.exe 28 PID 3052 wrote to memory of 2824 3052 0c7acffd58137e90a8fb504249be8053.exe 28 PID 3052 wrote to memory of 2824 3052 0c7acffd58137e90a8fb504249be8053.exe 28 PID 2824 wrote to memory of 1092 2824 RAVQQHXMON.exe 2 PID 3052 wrote to memory of 2672 3052 0c7acffd58137e90a8fb504249be8053.exe 29 PID 3052 wrote to memory of 2672 3052 0c7acffd58137e90a8fb504249be8053.exe 29 PID 3052 wrote to memory of 2672 3052 0c7acffd58137e90a8fb504249be8053.exe 29 PID 3052 wrote to memory of 2672 3052 0c7acffd58137e90a8fb504249be8053.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\0c7acffd58137e90a8fb504249be8053.exe"C:\Users\Admin\AppData\Local\Temp\0c7acffd58137e90a8fb504249be8053.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files\Internet Explorer\RAVQQHXMON.exe"C:\Program Files\Internet Explorer\RAVQQHXMON.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\0c7acffd58137e90a8fb504249be8053.exe"3⤵
- Deletes itself
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD50c7acffd58137e90a8fb504249be8053
SHA11103049c2f83155ccdbad9cfa48093c05e16f9f0
SHA25665baea29610aae6289023b7d91beae03eaab7e541ee2e01ce9c1684af12cacf7
SHA512c6eaf43cb8b97ec6827c685b7356264362214ffb98cd8f0bbc6f154d54ff2f88503ae392d9934d471d2415087eb00466abfa7a68ae37c80655724f7b0b1c356a