Analysis

  • max time kernel
    12s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 20:09

General

  • Target

    41cc4ad694dee60a1390b3e3d409d68e.exe

  • Size

    39KB

  • MD5

    41cc4ad694dee60a1390b3e3d409d68e

  • SHA1

    073aa3e3fd09b4c09e07d2a70273deb034d3faf8

  • SHA256

    c5e6f43ab4a37490af01cdce8bc7b8e1f58d5e221b1a4222e6eb5804675400a0

  • SHA512

    03c9d4a046fb79a569b9552c2c72ee03b9588bea4eeee0871aba5da5322d6091d2f3c9a9e3df14b90eae40b7236e759f881b24b9d0ddc5d24c16b3b1454f94c9

  • SSDEEP

    768:khWRQv9P+xt+lpHwvs2ZSz/ta8fTtwMX8WS9NBVrOXVGr+5HI:yWRi+xepQk2ZWtaQa9aci5HI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Roaming\panel\panel.exe
    -b
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1812
  • C:\Users\Admin\AppData\Local\Temp\41cc4ad694dee60a1390b3e3d409d68e.exe
    "C:\Users\Admin\AppData\Local\Temp\41cc4ad694dee60a1390b3e3d409d68e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Roaming\panel\upd.bat"
      2⤵
      • Deletes itself
      PID:3056
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1244

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\panel\panel.exe

      Filesize

      39KB

      MD5

      41cc4ad694dee60a1390b3e3d409d68e

      SHA1

      073aa3e3fd09b4c09e07d2a70273deb034d3faf8

      SHA256

      c5e6f43ab4a37490af01cdce8bc7b8e1f58d5e221b1a4222e6eb5804675400a0

      SHA512

      03c9d4a046fb79a569b9552c2c72ee03b9588bea4eeee0871aba5da5322d6091d2f3c9a9e3df14b90eae40b7236e759f881b24b9d0ddc5d24c16b3b1454f94c9

    • C:\Users\Admin\AppData\Roaming\panel\upd.bat

      Filesize

      1KB

      MD5

      afef7731b49b1ccb90c8f33d87926df8

      SHA1

      37cfbd997d9b7ed51c9029ccda9ebecc876a99d0

      SHA256

      8d4504e070c845f9471fd192360721d452574fde25ef4ab53f29bca261d1fb79

      SHA512

      e267524dfe4aacb6f55d857f8e94fb96bdfcec52bf91ab371ed5d0aa251bae82bc4ce68226d644d1fe436771cac8da900e9dc8101c5f95ed5ff914c0addc7430

    • memory/1244-43-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB

    • memory/1244-39-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB

    • memory/1244-67-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB

    • memory/1244-63-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB

    • memory/1244-59-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB

    • memory/1244-55-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB

    • memory/1244-51-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB

    • memory/1244-47-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB

    • memory/1244-23-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB

    • memory/1244-71-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB

    • memory/1244-35-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB

    • memory/1244-31-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB

    • memory/1244-27-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB

    • memory/1812-17-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2212-1-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB

    • memory/2212-10-0x0000000000340000-0x0000000000365000-memory.dmp

      Filesize

      148KB

    • memory/2212-2-0x00000000002B0000-0x00000000002B2000-memory.dmp

      Filesize

      8KB

    • memory/2212-0-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2212-3-0x0000000014D00000-0x0000000014D16000-memory.dmp

      Filesize

      88KB