Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
27a69ab14b60a27cb207624505f07ab5.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
27a69ab14b60a27cb207624505f07ab5.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
27a69ab14b60a27cb207624505f07ab5.exe
-
Size
27KB
-
MD5
27a69ab14b60a27cb207624505f07ab5
-
SHA1
a0301e76029138d5971fac10dd121098e16c5bc8
-
SHA256
16ecbb4c7d777c9174de85af9dd6f672ad484cb0bfd4da3018ac768fdd120172
-
SHA512
d79a32eaf8b16d0c106b0145a7b0bbda00389ed33292300e43c509a5f1fa44cf785cebfd8847c9f12257d4398f3d72637998b30f23ef53253aa6e0bcf6eff58b
-
SSDEEP
384:hvrwnbNjmFdh9cYwy8SWyEtrjcL3iE7p4KV68a6F/:9EnbNyq0XWNC7p4m68ak
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 27a69ab14b60a27cb207624505f07ab5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\27a69ab14b60a27cb207624505f07ab5.exe" 27a69ab14b60a27cb207624505f07ab5.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2224 27a69ab14b60a27cb207624505f07ab5.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2224 27a69ab14b60a27cb207624505f07ab5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2224 27a69ab14b60a27cb207624505f07ab5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2224 wrote to memory of 592 2224 27a69ab14b60a27cb207624505f07ab5.exe 20 PID 2224 wrote to memory of 1588 2224 27a69ab14b60a27cb207624505f07ab5.exe 28 PID 2224 wrote to memory of 1588 2224 27a69ab14b60a27cb207624505f07ab5.exe 28 PID 2224 wrote to memory of 1588 2224 27a69ab14b60a27cb207624505f07ab5.exe 28 PID 2224 wrote to memory of 1588 2224 27a69ab14b60a27cb207624505f07ab5.exe 28 PID 2224 wrote to memory of 1588 2224 27a69ab14b60a27cb207624505f07ab5.exe 28
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\27a69ab14b60a27cb207624505f07ab5.exe"C:\Users\Admin\AppData\Local\Temp\27a69ab14b60a27cb207624505f07ab5.exe"1⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" %12⤵PID:1588
-