Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 07:23
Behavioral task
behavioral1
Sample
2d3ae51275a8631d9099fe7c216cad4f.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2d3ae51275a8631d9099fe7c216cad4f.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
2d3ae51275a8631d9099fe7c216cad4f.exe
-
Size
25KB
-
MD5
2d3ae51275a8631d9099fe7c216cad4f
-
SHA1
e61df6c2c001f54b56ff8b12bed03234e40d2659
-
SHA256
59cf569fd6151c044f06051c3021b5bc830cf5449c76b118b5e9bf3f4988ee86
-
SHA512
c426e5a280e05e6285a8120be87658df14e71ae845b0702cf8109e4249d61eb88360c68976f4624d18d5699a6f04b474673afff288b91b6fae9b71a770ecc340
-
SSDEEP
384:M+g+Zmk+fIjXJ2lW0JDFB5kiC+nyZ9sGCHC5Iwz9HRMEihm1Ucqk3U:MK8k+wDJZ0J79nyZQi5Iwz9HRMEiho3U
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2408 decrypted.exe -
Loads dropped DLL 3 IoCs
pid Process 2300 2d3ae51275a8631d9099fe7c216cad4f.exe 2300 2d3ae51275a8631d9099fe7c216cad4f.exe 2408 decrypted.exe -
resource yara_rule behavioral1/memory/2300-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2408-14-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2300-13-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/2408-34-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000800000001223f-5.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 2696 cmd.exe Token: SeSystemtimePrivilege 2696 cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2300 2d3ae51275a8631d9099fe7c216cad4f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2300 wrote to memory of 2408 2300 2d3ae51275a8631d9099fe7c216cad4f.exe 19 PID 2300 wrote to memory of 2408 2300 2d3ae51275a8631d9099fe7c216cad4f.exe 19 PID 2300 wrote to memory of 2408 2300 2d3ae51275a8631d9099fe7c216cad4f.exe 19 PID 2300 wrote to memory of 2408 2300 2d3ae51275a8631d9099fe7c216cad4f.exe 19 PID 2408 wrote to memory of 2696 2408 decrypted.exe 17 PID 2408 wrote to memory of 2696 2408 decrypted.exe 17 PID 2408 wrote to memory of 2696 2408 decrypted.exe 17 PID 2408 wrote to memory of 2696 2408 decrypted.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d3ae51275a8631d9099fe7c216cad4f.exe"C:\Users\Admin\AppData\Local\Temp\2d3ae51275a8631d9099fe7c216cad4f.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\decrypted.exe"C:\Users\Admin\AppData\Local\Temp\decrypted.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2408
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\67F7.tmp\3.bat""1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2696