Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 11:47
Behavioral task
behavioral1
Sample
1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe
Resource
win10v2004-20231222-en
General
-
Target
1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe
-
Size
830KB
-
MD5
cdaaa40fca9061e01cddb07273a9a0d4
-
SHA1
c3ee35f05b70755d76cb304207332f007a1df669
-
SHA256
1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e
-
SHA512
95d78994f2c72a1a260266f322f556485ffbcc3eea9f24eb6ddb25916ba1a7871a0effaddb90b1bcb4061c973a3338b9f120360cb2e1a9d0ee9bc12ad0057336
-
SSDEEP
12288:ZEmC92VnpahSR7BwkASR49lkQHMIWnDp2f47z4PUUhyVb4yDKUgM03qcmT1Pd2KE:ZEF96C6BwkP2lsl8fEQemdM03zmT1P2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 788 cmd.exe -
resource yara_rule behavioral1/memory/2936-0-0x0000000000FE0000-0x000000000111C000-memory.dmp upx behavioral1/memory/2936-36-0x0000000000FE0000-0x000000000111C000-memory.dmp upx behavioral1/memory/2936-38-0x0000000000FE0000-0x000000000111C000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\WindowsShell72007.log 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe File opened for modification C:\Windows\WindowSystemNewUpdate045.log unregmp2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3056 1092 WerFault.exe 28 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe Token: SeDebugPrivilege 3040 unregmp2.exe Token: SeIncBasePriorityPrivilege 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2936 wrote to memory of 1092 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 28 PID 2936 wrote to memory of 1092 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 28 PID 2936 wrote to memory of 1092 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 28 PID 2936 wrote to memory of 1092 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 28 PID 2936 wrote to memory of 1092 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 28 PID 2936 wrote to memory of 1092 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 28 PID 2936 wrote to memory of 1092 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 28 PID 1092 wrote to memory of 3056 1092 osk.exe 29 PID 1092 wrote to memory of 3056 1092 osk.exe 29 PID 1092 wrote to memory of 3056 1092 osk.exe 29 PID 1092 wrote to memory of 3056 1092 osk.exe 29 PID 2936 wrote to memory of 3040 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 30 PID 2936 wrote to memory of 3040 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 30 PID 2936 wrote to memory of 3040 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 30 PID 2936 wrote to memory of 3040 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 30 PID 2936 wrote to memory of 3040 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 30 PID 2936 wrote to memory of 3040 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 30 PID 2936 wrote to memory of 3040 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 30 PID 2936 wrote to memory of 3040 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 30 PID 2936 wrote to memory of 3040 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 30 PID 2936 wrote to memory of 3040 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 30 PID 2936 wrote to memory of 788 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 32 PID 2936 wrote to memory of 788 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 32 PID 2936 wrote to memory of 788 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 32 PID 2936 wrote to memory of 788 2936 1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe"C:\Users\Admin\AppData\Local\Temp\1113c2ecb3537273005f30acebeacbce56f29c4300165b901a23f8d300e1527e.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\osk.exe"C:\Windows\SysWOW64\osk.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 1723⤵
- Program crash
PID:3056
-
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\SysWOW64\unregmp2.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\1113C2~1.EXE > nul2⤵
- Deletes itself
PID:788
-