Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
16c0d73e0309b56396209f7fc6406ac1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
16c0d73e0309b56396209f7fc6406ac1.exe
Resource
win10v2004-20231215-en
General
-
Target
16c0d73e0309b56396209f7fc6406ac1.exe
-
Size
602KB
-
MD5
16c0d73e0309b56396209f7fc6406ac1
-
SHA1
b44b1456ceb08add1490dc039583472e34be5795
-
SHA256
16bfafeac94249f128ba8a0efade5a194e31613fc1f34fd486482cb33a5327aa
-
SHA512
e0c3eb406429e862c58e6f39e0c2aff58cc50f3c39a893d2e5b91a6ad2bea703a144ac685fd4b2053c9156eb870dc9295f66420f64de3e55955e84b274e81263
-
SSDEEP
12288:8m9tYGlMpPtBUqh9CCkkVBZ9acbFVejE69p0xBqr/HAvTaBzclmIszm1tq:8CYrpPtBUqh9CCkkVBZ8Qejx9GkAvu2z
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2936-0-0x0000000000420000-0x0000000000548000-memory.dmp upx behavioral1/memory/2936-1-0x0000000000420000-0x0000000000548000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is259398010.log 16c0d73e0309b56396209f7fc6406ac1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main 16c0d73e0309b56396209f7fc6406ac1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2936 16c0d73e0309b56396209f7fc6406ac1.exe 2936 16c0d73e0309b56396209f7fc6406ac1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2936 16c0d73e0309b56396209f7fc6406ac1.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2936 16c0d73e0309b56396209f7fc6406ac1.exe 2936 16c0d73e0309b56396209f7fc6406ac1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16c0d73e0309b56396209f7fc6406ac1.exe"C:\Users\Admin\AppData\Local\Temp\16c0d73e0309b56396209f7fc6406ac1.exe"1⤵
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2936