Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
10ee601047d30fdc8cde26e85b85ea9e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10ee601047d30fdc8cde26e85b85ea9e.exe
Resource
win10v2004-20231215-en
General
-
Target
10ee601047d30fdc8cde26e85b85ea9e.exe
-
Size
757KB
-
MD5
10ee601047d30fdc8cde26e85b85ea9e
-
SHA1
92d359c18a7bccbcb5360e7810f037f071e4ffe6
-
SHA256
c18770a8cbfc5ff7ceeaa918208c2e4827f3e2275d2030750ec6bd3f8cd7b2c9
-
SHA512
6874829d03e945e3d6d644a960515493c4ff771370e67a475b85fa38d0075243e0bec4ff1312afea405df9a42ff0daebc064bdfa6f5f6550431efe6da6088650
-
SSDEEP
12288:6EwS/TZxglpaO3GW5A9ArVXPNilTjh7LyvjEkIkLT3n5xrs8Z2wJ5k6Rd3CKNnDd:6B2YlpTGW5A9ArN8p9yv7IkLkQj7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3344 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\HgzServer\svchost.exe 10ee601047d30fdc8cde26e85b85ea9e.exe File opened for modification C:\Program Files (x86)\HgzServer\svchost.exe 10ee601047d30fdc8cde26e85b85ea9e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1212 10ee601047d30fdc8cde26e85b85ea9e.exe Token: SeDebugPrivilege 3344 svchost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3344 svchost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3344 wrote to memory of 3312 3344 svchost.exe 93 PID 3344 wrote to memory of 3312 3344 svchost.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\10ee601047d30fdc8cde26e85b85ea9e.exe"C:\Users\Admin\AppData\Local\Temp\10ee601047d30fdc8cde26e85b85ea9e.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
C:\Program Files (x86)\HgzServer\svchost.exe"C:\Program Files (x86)\HgzServer\svchost.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:3312
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
757KB
MD510ee601047d30fdc8cde26e85b85ea9e
SHA192d359c18a7bccbcb5360e7810f037f071e4ffe6
SHA256c18770a8cbfc5ff7ceeaa918208c2e4827f3e2275d2030750ec6bd3f8cd7b2c9
SHA5126874829d03e945e3d6d644a960515493c4ff771370e67a475b85fa38d0075243e0bec4ff1312afea405df9a42ff0daebc064bdfa6f5f6550431efe6da6088650