Analysis
-
max time kernel
102s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 04:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
453b55c4edcb63c6cf3b2077b5d88991.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
453b55c4edcb63c6cf3b2077b5d88991.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
453b55c4edcb63c6cf3b2077b5d88991.exe
-
Size
14KB
-
MD5
453b55c4edcb63c6cf3b2077b5d88991
-
SHA1
3c9a1f1b0aaf2b6c5dc52a365afa9461107c0845
-
SHA256
6c055ad1d7d54b5eb0d13e16d55e740db81028913b81a3c00bdfaa2ebb66b645
-
SHA512
eacd69417e7d0e29ec8bcb5f36a65f4daf8ac0b562b79a7491afde0d92b0fdeb1665d03f10aacffb6ae720cbf22dcaff85eb49c1a86d67595b3e1b313c4f3e54
-
SSDEEP
192:Tb61S4bEpynRZtRjzDbiZlOWiknlLfP1oynlY2+IXesWnLM:3jBynRZtRPql/nlb1Y2+BsWL
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2124 msccrt.exe -
Executes dropped EXE 1 IoCs
pid Process 2124 msccrt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\msccrt = "C:\\Windows\\msccrt.exe" msccrt.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\msccrt.dll msccrt.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\msccrt.exe 453b55c4edcb63c6cf3b2077b5d88991.exe File opened for modification C:\Windows\msccrt.exe 453b55c4edcb63c6cf3b2077b5d88991.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2124 msccrt.exe 2124 msccrt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2500 453b55c4edcb63c6cf3b2077b5d88991.exe Token: SeDebugPrivilege 2124 msccrt.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2124 2500 453b55c4edcb63c6cf3b2077b5d88991.exe 20 PID 2500 wrote to memory of 2124 2500 453b55c4edcb63c6cf3b2077b5d88991.exe 20 PID 2500 wrote to memory of 2124 2500 453b55c4edcb63c6cf3b2077b5d88991.exe 20 PID 2124 wrote to memory of 3512 2124 msccrt.exe 49 PID 2124 wrote to memory of 3512 2124 msccrt.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\453b55c4edcb63c6cf3b2077b5d88991.exe"C:\Users\Admin\AppData\Local\Temp\453b55c4edcb63c6cf3b2077b5d88991.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\msccrt.exeC:\Windows\msccrt.exe @C:\Users\Admin\AppData\Local\Temp\453b55c4edcb63c6cf3b2077b5d88991.exe@25002⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3512