Analysis
-
max time kernel
7s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 11:59
Behavioral task
behavioral1
Sample
355d8e77096d20686848f800c0817844.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
355d8e77096d20686848f800c0817844.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
355d8e77096d20686848f800c0817844.exe
-
Size
924KB
-
MD5
355d8e77096d20686848f800c0817844
-
SHA1
3d4500b77516723956e9e255fae444ef2fa371ea
-
SHA256
e1ccb86b01d0884592e12a51fbfcd70b876d6274f2b3c9d3d3077b83a104cc0a
-
SHA512
9f14274120f394f7a4d53c919594cae007d1d02bafed4f02eee08be01117fdf34fa683dd82075f053e08576600c7535c03f0e0bdaafa48c8a17e5b5c9731acc2
-
SSDEEP
24576:4MKln2kagSnY7jZdlu681RfthDzMfXdforgkY:4pn2kadmfF81R1hsC
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2816-0-0x0000000000400000-0x00000000006F0000-memory.dmp vmprotect behavioral1/memory/2816-1-0x0000000000400000-0x00000000006F0000-memory.dmp vmprotect behavioral1/memory/2816-89-0x0000000000400000-0x00000000006F0000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2816 355d8e77096d20686848f800c0817844.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2816 355d8e77096d20686848f800c0817844.exe Token: 33 2816 355d8e77096d20686848f800c0817844.exe Token: SeIncBasePriorityPrivilege 2816 355d8e77096d20686848f800c0817844.exe Token: SeDebugPrivilege 2816 355d8e77096d20686848f800c0817844.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2816 355d8e77096d20686848f800c0817844.exe 2816 355d8e77096d20686848f800c0817844.exe 2816 355d8e77096d20686848f800c0817844.exe 2816 355d8e77096d20686848f800c0817844.exe 2816 355d8e77096d20686848f800c0817844.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\355d8e77096d20686848f800c0817844.exe"C:\Users\Admin\AppData\Local\Temp\355d8e77096d20686848f800c0817844.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe url.dll,FileProtocolHandler http://www.vdisk.cn/user/admin/jwyy2010/2⤵PID:1260
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.vdisk.cn/user/admin/jwyy2010/3⤵PID:944
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:944 CREDAT:275457 /prefetch:24⤵PID:2908
-
-
-