Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 03:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0d8efbcde163cde2d491798f3b14e2c7.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
0d8efbcde163cde2d491798f3b14e2c7.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
0d8efbcde163cde2d491798f3b14e2c7.exe
-
Size
13KB
-
MD5
0d8efbcde163cde2d491798f3b14e2c7
-
SHA1
1b5916841cbb0a38c58459c4f22449b8f419191a
-
SHA256
56ced057453fe83f61aa07cecb61a21d2483fc8987e53cc327b445f661c9e2fa
-
SHA512
1ef1ab95bae9344f508c3c8a91b9f9ce1f079ba314af9d9760f66539d760937a24e2d807a65fc44ff2d624b37ad8d8f4b593aec2e66b9ac8df47aea80b62cee3
-
SSDEEP
384:8lzmbqmQEjzwyYlWOtBK3akzAHgPS6HKqWbqD:8lmlQEjE9lrXkzAHanAbqD
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4712 0d8efbcde163cde2d491798f3b14e2c7.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ethsh.cfg 0d8efbcde163cde2d491798f3b14e2c7.exe File opened for modification C:\Windows\SysWOW64\ethsh.dll 0d8efbcde163cde2d491798f3b14e2c7.exe File created C:\Windows\SysWOW64\ethsh.dll 0d8efbcde163cde2d491798f3b14e2c7.exe File created C:\Windows\SysWOW64\sperls.dll 0d8efbcde163cde2d491798f3b14e2c7.exe File opened for modification C:\Windows\SysWOW64\sperls.dll 0d8efbcde163cde2d491798f3b14e2c7.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 4712 0d8efbcde163cde2d491798f3b14e2c7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4712 0d8efbcde163cde2d491798f3b14e2c7.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4712 wrote to memory of 3568 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 47 PID 4712 wrote to memory of 1552 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 63 PID 4712 wrote to memory of 1552 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 63 PID 4712 wrote to memory of 1552 4712 0d8efbcde163cde2d491798f3b14e2c7.exe 63
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d8efbcde163cde2d491798f3b14e2c7.exe"C:\Users\Admin\AppData\Local\Temp\0d8efbcde163cde2d491798f3b14e2c7.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\0d8efbcde163cde2d491798f3b14e2c7.exe"2⤵PID:1552
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3568