Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
39baaa7802936dd3b231a168c7f2a9cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39baaa7802936dd3b231a168c7f2a9cb.exe
Resource
win10v2004-20231215-en
General
-
Target
39baaa7802936dd3b231a168c7f2a9cb.exe
-
Size
693KB
-
MD5
39baaa7802936dd3b231a168c7f2a9cb
-
SHA1
42d3f66b293e32b3f024bbc7089c43d6a5609b2e
-
SHA256
46bb3976fe4fb95e150c9ba59f182ff9bd3ad732a03dcc244cacc2d32bd8cd2b
-
SHA512
842decc8c26ef2021298b0f62e5531280353beb59cc1b42adac57a0e7c46654aa97a9bdf370742f42bdd29dac7e103b7085f2db392881e7943b946b5a0c0b471
-
SSDEEP
12288:fxeS3tVM8wI00yCluursqGF3Z4mxxSU7/U0gNTsQ1UVcS4:fxemMhI00yeUqGQmXSUdQmSS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2844 guo.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\guo.exe 39baaa7802936dd3b231a168c7f2a9cb.exe File opened for modification C:\Windows\guo.exe 39baaa7802936dd3b231a168c7f2a9cb.exe File created C:\Windows\guocok88.BAT 39baaa7802936dd3b231a168c7f2a9cb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 624 39baaa7802936dd3b231a168c7f2a9cb.exe Token: SeDebugPrivilege 2844 guo.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 guo.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 624 wrote to memory of 2748 624 39baaa7802936dd3b231a168c7f2a9cb.exe 31 PID 624 wrote to memory of 2748 624 39baaa7802936dd3b231a168c7f2a9cb.exe 31 PID 624 wrote to memory of 2748 624 39baaa7802936dd3b231a168c7f2a9cb.exe 31 PID 624 wrote to memory of 2748 624 39baaa7802936dd3b231a168c7f2a9cb.exe 31 PID 2844 wrote to memory of 2940 2844 guo.exe 30 PID 2844 wrote to memory of 2940 2844 guo.exe 30 PID 2844 wrote to memory of 2940 2844 guo.exe 30 PID 2844 wrote to memory of 2940 2844 guo.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\39baaa7802936dd3b231a168c7f2a9cb.exe"C:\Users\Admin\AppData\Local\Temp\39baaa7802936dd3b231a168c7f2a9cb.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\guocok88.BAT2⤵
- Deletes itself
PID:2748
-
-
C:\Windows\guo.exeC:\Windows\guo.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
693KB
MD539baaa7802936dd3b231a168c7f2a9cb
SHA142d3f66b293e32b3f024bbc7089c43d6a5609b2e
SHA25646bb3976fe4fb95e150c9ba59f182ff9bd3ad732a03dcc244cacc2d32bd8cd2b
SHA512842decc8c26ef2021298b0f62e5531280353beb59cc1b42adac57a0e7c46654aa97a9bdf370742f42bdd29dac7e103b7085f2db392881e7943b946b5a0c0b471
-
Filesize
190B
MD576ff39ca8af6a80145af4b8805053cec
SHA1c0e26a45c67f77b15d0399b615b3d2f68c76b51f
SHA256d04141ec32c20b6f21aaa412fa07b84dc454145eacb81fcbc8a5c83a78171df2
SHA51267dd8f2bb197e381159a5f2456f1b8f9503de55665a21080ec765b6a4e0b4a30f986ee048f8570e9f256d1125a82900ad161de2bfbb21493392d6f3e29e31d84