Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
466ca0138e9c523335ddebcc6b9e4048.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
466ca0138e9c523335ddebcc6b9e4048.exe
Resource
win10v2004-20231215-en
General
-
Target
466ca0138e9c523335ddebcc6b9e4048.exe
-
Size
685KB
-
MD5
466ca0138e9c523335ddebcc6b9e4048
-
SHA1
ac9baa0d77c2c117a5930ae36ecb0027d039357e
-
SHA256
d470982065f1678e0150a23a969bfc1c4e2727e1058da0d1b888e4cc07a5b300
-
SHA512
a6f42b77f1afdd2813e7ca5c851df56eb84ba6716548a1a2f24bcc4cb3662f3ce716d4f91d91f30ca3e7be2523036cbdcb763dc7fdcfcd95ee4b67a96bdebf53
-
SSDEEP
12288:hYnDALFG/wQh0+hu50p3ktQPVN/JaIZrN1F3Z4mxxhX2Fi0yT8i:hqoFkRhXhuu34GfLBQmXcZywi
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4868 SERVER~1.EXE 2820 Hacker.com.cn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 466ca0138e9c523335ddebcc6b9e4048.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe SERVER~1.EXE File opened for modification C:\Windows\Hacker.com.cn.exe SERVER~1.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4868 SERVER~1.EXE Token: SeDebugPrivilege 2820 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2820 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2652 wrote to memory of 4868 2652 466ca0138e9c523335ddebcc6b9e4048.exe 87 PID 2652 wrote to memory of 4868 2652 466ca0138e9c523335ddebcc6b9e4048.exe 87 PID 2652 wrote to memory of 4868 2652 466ca0138e9c523335ddebcc6b9e4048.exe 87 PID 2820 wrote to memory of 4236 2820 Hacker.com.cn.exe 92 PID 2820 wrote to memory of 4236 2820 Hacker.com.cn.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\466ca0138e9c523335ddebcc6b9e4048.exe"C:\Users\Admin\AppData\Local\Temp\466ca0138e9c523335ddebcc6b9e4048.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
490KB
MD5a671ccc34f65d971d1a0ff692e37e05c
SHA1400baf72d6bbd4c41ee06bfa874fede8d7a2000c
SHA25679626a7e6d463b59c05e10c79da5b7a46f62ec7e6cc066db0f2cc2651f400a76
SHA512c31ed6f3aa21d36f55f9164dcf36a47ff1e59e169ccbfe73e5c569cbb5ae958c2d09bb23a94417891394268041a6dc6a86d4ad0f6b3fdf1f76e3ca73181028b5
-
Filesize
576KB
MD534e376dea13beb28c394a6c19b553b9c
SHA12f99d6a8ee0a918aa503a84595fc3b6dbfb7a0ef
SHA2567cbcfd241c543058faf745fab650c709d61de346373a5fcd6ccae9c38bf236c2
SHA512586ebb737792e9841012f3892a7ef140460d2c257e0ea7bbe2a3c03a9435a71030795a8a7203348d3a35968ae60e37e5c7be243dfa3b7c76a98af25bc8f55752
-
Filesize
524KB
MD52eb96c15112a267fe478193604957c9c
SHA1fbf1c47b833a8577cc06127f71ce46328f45ef2e
SHA256224d108586888666c85d8709982c53a54a2e3b16ae894c003f44caa21910241c
SHA512fe85a47428b34e69bcfdfffb819a4ad9f1d5cd4044500a3aaebde72a57f043986a2791be63cf9d003005f97b25a9d643a9edc656c82160124c2f3a6658d1df36
-
Filesize
743KB
MD5d5603cf01dd9c6db0bcfe45f9c8f904c
SHA1f2139317b6bd41f946df974b88de0b9758cba275
SHA2569c53cdd248b771ac6d9ac70d4de71cb421c940f1a8fbaa196598d272528c2389
SHA51225782f6ae20547dc3839a8f3d74d0830baaed58f88410ebeae45b1b5231828a013267f15f57e4c8ad1fc0c9d05ba57d8977a93a71b59c35e126eaba2cd830ec3