Analysis
-
max time kernel
5s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:17
Behavioral task
behavioral1
Sample
379fb1a0ae56554e5619e287eff61635.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
379fb1a0ae56554e5619e287eff61635.exe
-
Size
3.1MB
-
MD5
379fb1a0ae56554e5619e287eff61635
-
SHA1
967312955e9b84093aab815f76c9734058a539a2
-
SHA256
82ac93d2030fe23a014c9126668dfb4fb8c4ac6c5bc7a9384374ed2c8b2b342e
-
SHA512
97fa14dbaeb56f02ce2a61ee34d62857d2a541ac200ce94bcad2446a26a85fda83141fa967e5f1de6923a0e17c38445a339db379fafc746bcab70c07f1a494a5
-
SSDEEP
98304:wdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8h:wdNB4ianUstYuUR2CSHsVP8h
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
test.exeFile.exepid process 2812 test.exe 2740 File.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exetest.exepid process 2628 cmd.exe 2812 test.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
test.exeFile.exepid process 2812 test.exe 2740 File.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
test.exeFile.exedescription pid process Token: SeDebugPrivilege 2812 test.exe Token: SeDebugPrivilege 2740 File.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
379fb1a0ae56554e5619e287eff61635.execmd.exetest.exedescription pid process target process PID 1848 wrote to memory of 2628 1848 379fb1a0ae56554e5619e287eff61635.exe cmd.exe PID 1848 wrote to memory of 2628 1848 379fb1a0ae56554e5619e287eff61635.exe cmd.exe PID 1848 wrote to memory of 2628 1848 379fb1a0ae56554e5619e287eff61635.exe cmd.exe PID 1848 wrote to memory of 2628 1848 379fb1a0ae56554e5619e287eff61635.exe cmd.exe PID 2628 wrote to memory of 2812 2628 cmd.exe test.exe PID 2628 wrote to memory of 2812 2628 cmd.exe test.exe PID 2628 wrote to memory of 2812 2628 cmd.exe test.exe PID 2628 wrote to memory of 2812 2628 cmd.exe test.exe PID 2628 wrote to memory of 2812 2628 cmd.exe test.exe PID 2628 wrote to memory of 2812 2628 cmd.exe test.exe PID 2628 wrote to memory of 2812 2628 cmd.exe test.exe PID 2812 wrote to memory of 2740 2812 test.exe File.exe PID 2812 wrote to memory of 2740 2812 test.exe File.exe PID 2812 wrote to memory of 2740 2812 test.exe File.exe PID 2812 wrote to memory of 2740 2812 test.exe File.exe PID 2812 wrote to memory of 2740 2812 test.exe File.exe PID 2812 wrote to memory of 2740 2812 test.exe File.exe PID 2812 wrote to memory of 2740 2812 test.exe File.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier2⤵PID:1548
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f2⤵PID:1020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/File.exe" "%temp%\FolderN\name.exe" /Y2⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵PID:2548
-
-
C:\Users\Admin\AppData\Roaming\tmp.exe"C:\Users\Admin\AppData\Roaming\tmp.exe"2⤵PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\test.exetest.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > %temp%\FolderN\name.exe:Zone.Identifier2⤵PID:1600
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "%temp%\FolderN\name.exe.lnk" /f2⤵PID:2616
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:/Users/Admin/AppData/Local/Temp/test.exe" "%temp%\FolderN\name.exe" /Y2⤵PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\svhost.exe"C:\Users\Admin\AppData\Local\Temp\svhost.exe"2⤵PID:2552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c test.exe1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2628
-
C:\Users\Admin\AppData\Local\Temp\379fb1a0ae56554e5619e287eff61635.exe"C:\Users\Admin\AppData\Local\Temp\379fb1a0ae56554e5619e287eff61635.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1848
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f1⤵PID:2440
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v Load /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\FolderN\name.exe.lnk" /f1⤵PID:2828