Analysis
-
max time kernel
67s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 14:40
Behavioral task
behavioral1
Sample
16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe
Resource
win10v2004-20231215-en
General
-
Target
16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe
-
Size
536KB
-
MD5
759aac2d106f797f4ee6ac1dffb117f1
-
SHA1
f0abc1820ba698b33a431c03133a852be69881fe
-
SHA256
16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265
-
SHA512
3138e01ef92d7fa3275f24203f8d667ea5862529ed654b9f3473699b5841d528fb12d290e8ce1f68ebc4643a32befc242ea79edc324ce24497a567f240963f4d
-
SSDEEP
12288:Fhf0Bs9bDDq9hu53Ltp/p+gPhhwPOaoTJRkmOkx2LIa:FdQyDL9xp/BGA1RkmOkx2LF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1432-0-0x0000000000100000-0x0000000000202000-memory.dmp upx behavioral2/memory/1432-11-0x0000000000100000-0x0000000000202000-memory.dmp upx behavioral2/memory/1432-19-0x0000000000100000-0x0000000000202000-memory.dmp upx behavioral2/memory/1432-26-0x0000000000100000-0x0000000000202000-memory.dmp upx behavioral2/memory/1432-27-0x0000000000100000-0x0000000000202000-memory.dmp upx behavioral2/memory/1432-28-0x0000000000100000-0x0000000000202000-memory.dmp upx behavioral2/memory/1432-29-0x0000000000100000-0x0000000000202000-memory.dmp upx behavioral2/memory/1432-34-0x0000000000100000-0x0000000000202000-memory.dmp upx behavioral2/memory/1432-46-0x0000000000100000-0x0000000000202000-memory.dmp upx -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 223.5.5.5 Destination IP 114.114.114.114 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\188430 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1432 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe 1432 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe 1432 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe 1432 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe 1432 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe 1432 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe 1432 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe 1432 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe 3412 Explorer.EXE 3412 Explorer.EXE 3412 Explorer.EXE 3412 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1432 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe Token: SeTcbPrivilege 1432 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe Token: SeDebugPrivilege 1432 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe Token: SeDebugPrivilege 3412 Explorer.EXE Token: SeTcbPrivilege 3412 Explorer.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1432 wrote to memory of 3412 1432 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe 61 PID 1432 wrote to memory of 3412 1432 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe 61 PID 1432 wrote to memory of 3412 1432 16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe 61
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe"C:\Users\Admin\AppData\Local\Temp\16f1d56d532250407ac134d50a419ce3d55b61ba037797be96a7970146910265.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1432
-