Analysis

  • max time kernel
    141s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2024 14:08

General

  • Target

    466ca0138e9c523335ddebcc6b9e4048.exe

  • Size

    685KB

  • MD5

    466ca0138e9c523335ddebcc6b9e4048

  • SHA1

    ac9baa0d77c2c117a5930ae36ecb0027d039357e

  • SHA256

    d470982065f1678e0150a23a969bfc1c4e2727e1058da0d1b888e4cc07a5b300

  • SHA512

    a6f42b77f1afdd2813e7ca5c851df56eb84ba6716548a1a2f24bcc4cb3662f3ce716d4f91d91f30ca3e7be2523036cbdcb763dc7fdcfcd95ee4b67a96bdebf53

  • SSDEEP

    12288:hYnDALFG/wQh0+hu50p3ktQPVN/JaIZrN1F3Z4mxxhX2Fi0yT8i:hqoFkRhXhuu34GfLBQmXcZywi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\466ca0138e9c523335ddebcc6b9e4048.exe
    "C:\Users\Admin\AppData\Local\Temp\466ca0138e9c523335ddebcc6b9e4048.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2828
  • C:\Program Files\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
    1⤵
      PID:2880
    • C:\Windows\Hacker.com.cn.exe
      C:\Windows\Hacker.com.cn.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      93KB

      MD5

      e1783916cb3335caeef3b23d0100af09

      SHA1

      28d56f97ef05f57018477eccb08cad6ad01c9e1c

      SHA256

      be05823b53a68c17ebb4e0c7f79550a2f711f50bc3b19eec9be60ae59a4a23ac

      SHA512

      364a6e6c15ac55bc8d487c3be2d88b03ea1748207c75f4938387a22cc924c6390150c5e3bc5a1d4af397026ed1d266c33acdca7dfed1cad838addeeeae952eb7

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE

      Filesize

      743KB

      MD5

      d5603cf01dd9c6db0bcfe45f9c8f904c

      SHA1

      f2139317b6bd41f946df974b88de0b9758cba275

      SHA256

      9c53cdd248b771ac6d9ac70d4de71cb421c940f1a8fbaa196598d272528c2389

      SHA512

      25782f6ae20547dc3839a8f3d74d0830baaed58f88410ebeae45b1b5231828a013267f15f57e4c8ad1fc0c9d05ba57d8977a93a71b59c35e126eaba2cd830ec3

    • memory/2080-8-0x00000000002D0000-0x00000000002D1000-memory.dmp

      Filesize

      4KB

    • memory/2080-16-0x0000000000400000-0x0000000000401000-memory.dmp

      Filesize

      4KB

    • memory/2080-21-0x0000000000D30000-0x0000000000D31000-memory.dmp

      Filesize

      4KB

    • memory/2080-20-0x0000000000D50000-0x0000000000D51000-memory.dmp

      Filesize

      4KB

    • memory/2080-7-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/2080-18-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/2080-17-0x0000000000D00000-0x0000000000D01000-memory.dmp

      Filesize

      4KB

    • memory/2080-6-0x0000000000180000-0x0000000000181000-memory.dmp

      Filesize

      4KB

    • memory/2080-15-0x0000000000410000-0x0000000000411000-memory.dmp

      Filesize

      4KB

    • memory/2080-5-0x0000000000190000-0x0000000000191000-memory.dmp

      Filesize

      4KB

    • memory/2080-13-0x00000000003B0000-0x00000000003B1000-memory.dmp

      Filesize

      4KB

    • memory/2080-12-0x0000000000420000-0x0000000000421000-memory.dmp

      Filesize

      4KB

    • memory/2080-11-0x00000000003D0000-0x00000000003D1000-memory.dmp

      Filesize

      4KB

    • memory/2080-10-0x00000000003F0000-0x00000000003F1000-memory.dmp

      Filesize

      4KB

    • memory/2080-9-0x0000000000300000-0x0000000000301000-memory.dmp

      Filesize

      4KB

    • memory/2080-1-0x00000000001C0000-0x0000000000214000-memory.dmp

      Filesize

      336KB

    • memory/2080-19-0x0000000000D70000-0x0000000000D71000-memory.dmp

      Filesize

      4KB

    • memory/2080-22-0x0000000000D20000-0x0000000000D21000-memory.dmp

      Filesize

      4KB

    • memory/2080-14-0x00000000003A0000-0x00000000003A1000-memory.dmp

      Filesize

      4KB

    • memory/2080-4-0x00000000002F0000-0x00000000002F1000-memory.dmp

      Filesize

      4KB

    • memory/2080-3-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/2080-2-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2080-23-0x0000000000D90000-0x0000000000D91000-memory.dmp

      Filesize

      4KB

    • memory/2080-0-0x0000000001000000-0x0000000001110000-memory.dmp

      Filesize

      1.1MB

    • memory/2080-43-0x00000000001C0000-0x0000000000214000-memory.dmp

      Filesize

      336KB

    • memory/2080-42-0x0000000001000000-0x0000000001110000-memory.dmp

      Filesize

      1.1MB

    • memory/2080-24-0x0000000000D80000-0x0000000000D81000-memory.dmp

      Filesize

      4KB

    • memory/2828-40-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2828-37-0x00000000002E0000-0x00000000002E1000-memory.dmp

      Filesize

      4KB

    • memory/2876-41-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2876-44-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2876-45-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/2876-46-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2876-50-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB