Analysis
-
max time kernel
170s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
4172afdd8a093238a4d1080a99000338.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4172afdd8a093238a4d1080a99000338.exe
Resource
win10v2004-20231215-en
General
-
Target
4172afdd8a093238a4d1080a99000338.exe
-
Size
373KB
-
MD5
4172afdd8a093238a4d1080a99000338
-
SHA1
7e80a6841c4fcfbdeeb5e1445ed10b84886402fa
-
SHA256
26f86b2a7dd532807905d30243c2f595699ed7fc28a493eac94301d851e36be6
-
SHA512
60831b4e322ecab11497b86724605bd6edb8eee9fcd0fa88f4f35c848c03c7035c26938b75592a3bb9969537b406febcc46d77bfed3dc3d6ced11ccb85d25189
-
SSDEEP
6144:wlpCy8A2NxfcJPZBYh2h65ceX3STIhD631DmDb5ym1d2HansKUelUM/1wCvpzoOz:EpCy5nGh2U57C8tPDl66sq2MCCvLb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1648 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 528 wxaudiihm.exe -
Loads dropped DLL 3 IoCs
pid Process 1648 cmd.exe 1648 cmd.exe 528 wxaudiihm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2740 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2640 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 528 wxaudiihm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2740 taskkill.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe 528 wxaudiihm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1648 3008 4172afdd8a093238a4d1080a99000338.exe 32 PID 3008 wrote to memory of 1648 3008 4172afdd8a093238a4d1080a99000338.exe 32 PID 3008 wrote to memory of 1648 3008 4172afdd8a093238a4d1080a99000338.exe 32 PID 3008 wrote to memory of 1648 3008 4172afdd8a093238a4d1080a99000338.exe 32 PID 1648 wrote to memory of 2740 1648 cmd.exe 31 PID 1648 wrote to memory of 2740 1648 cmd.exe 31 PID 1648 wrote to memory of 2740 1648 cmd.exe 31 PID 1648 wrote to memory of 2740 1648 cmd.exe 31 PID 1648 wrote to memory of 2640 1648 cmd.exe 34 PID 1648 wrote to memory of 2640 1648 cmd.exe 34 PID 1648 wrote to memory of 2640 1648 cmd.exe 34 PID 1648 wrote to memory of 2640 1648 cmd.exe 34 PID 1648 wrote to memory of 528 1648 cmd.exe 35 PID 1648 wrote to memory of 528 1648 cmd.exe 35 PID 1648 wrote to memory of 528 1648 cmd.exe 35 PID 1648 wrote to memory of 528 1648 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\4172afdd8a093238a4d1080a99000338.exe"C:\Users\Admin\AppData\Local\Temp\4172afdd8a093238a4d1080a99000338.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 3008 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\4172afdd8a093238a4d1080a99000338.exe" & start C:\Users\Admin\AppData\Local\WXAUDI~1.EXE -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2640
-
-
C:\Users\Admin\AppData\Local\wxaudiihm.exeC:\Users\Admin\AppData\Local\WXAUDI~1.EXE -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:528
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 30081⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD54172afdd8a093238a4d1080a99000338
SHA17e80a6841c4fcfbdeeb5e1445ed10b84886402fa
SHA25626f86b2a7dd532807905d30243c2f595699ed7fc28a493eac94301d851e36be6
SHA51260831b4e322ecab11497b86724605bd6edb8eee9fcd0fa88f4f35c848c03c7035c26938b75592a3bb9969537b406febcc46d77bfed3dc3d6ced11ccb85d25189