Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/01/2024, 14:08

General

  • Target

    466ca0138e9c523335ddebcc6b9e4048.exe

  • Size

    685KB

  • MD5

    466ca0138e9c523335ddebcc6b9e4048

  • SHA1

    ac9baa0d77c2c117a5930ae36ecb0027d039357e

  • SHA256

    d470982065f1678e0150a23a969bfc1c4e2727e1058da0d1b888e4cc07a5b300

  • SHA512

    a6f42b77f1afdd2813e7ca5c851df56eb84ba6716548a1a2f24bcc4cb3662f3ce716d4f91d91f30ca3e7be2523036cbdcb763dc7fdcfcd95ee4b67a96bdebf53

  • SSDEEP

    12288:hYnDALFG/wQh0+hu50p3ktQPVN/JaIZrN1F3Z4mxxhX2Fi0yT8i:hqoFkRhXhuu34GfLBQmXcZywi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\466ca0138e9c523335ddebcc6b9e4048.exe
    "C:\Users\Admin\AppData\Local\Temp\466ca0138e9c523335ddebcc6b9e4048.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4868
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:4236

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE

      Filesize

      490KB

      MD5

      a671ccc34f65d971d1a0ff692e37e05c

      SHA1

      400baf72d6bbd4c41ee06bfa874fede8d7a2000c

      SHA256

      79626a7e6d463b59c05e10c79da5b7a46f62ec7e6cc066db0f2cc2651f400a76

      SHA512

      c31ed6f3aa21d36f55f9164dcf36a47ff1e59e169ccbfe73e5c569cbb5ae958c2d09bb23a94417891394268041a6dc6a86d4ad0f6b3fdf1f76e3ca73181028b5

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE

      Filesize

      576KB

      MD5

      34e376dea13beb28c394a6c19b553b9c

      SHA1

      2f99d6a8ee0a918aa503a84595fc3b6dbfb7a0ef

      SHA256

      7cbcfd241c543058faf745fab650c709d61de346373a5fcd6ccae9c38bf236c2

      SHA512

      586ebb737792e9841012f3892a7ef140460d2c257e0ea7bbe2a3c03a9435a71030795a8a7203348d3a35968ae60e37e5c7be243dfa3b7c76a98af25bc8f55752

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      524KB

      MD5

      2eb96c15112a267fe478193604957c9c

      SHA1

      fbf1c47b833a8577cc06127f71ce46328f45ef2e

      SHA256

      224d108586888666c85d8709982c53a54a2e3b16ae894c003f44caa21910241c

      SHA512

      fe85a47428b34e69bcfdfffb819a4ad9f1d5cd4044500a3aaebde72a57f043986a2791be63cf9d003005f97b25a9d643a9edc656c82160124c2f3a6658d1df36

    • C:\Windows\Hacker.com.cn.exe

      Filesize

      743KB

      MD5

      d5603cf01dd9c6db0bcfe45f9c8f904c

      SHA1

      f2139317b6bd41f946df974b88de0b9758cba275

      SHA256

      9c53cdd248b771ac6d9ac70d4de71cb421c940f1a8fbaa196598d272528c2389

      SHA512

      25782f6ae20547dc3839a8f3d74d0830baaed58f88410ebeae45b1b5231828a013267f15f57e4c8ad1fc0c9d05ba57d8977a93a71b59c35e126eaba2cd830ec3

    • memory/2652-20-0x0000000000D10000-0x0000000000D11000-memory.dmp

      Filesize

      4KB

    • memory/2652-18-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

      Filesize

      4KB

    • memory/2652-12-0x0000000000D00000-0x0000000000D01000-memory.dmp

      Filesize

      4KB

    • memory/2652-11-0x00000000031C0000-0x00000000031C1000-memory.dmp

      Filesize

      4KB

    • memory/2652-28-0x0000000000B90000-0x0000000000B91000-memory.dmp

      Filesize

      4KB

    • memory/2652-27-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

      Filesize

      4KB

    • memory/2652-25-0x0000000000D70000-0x0000000000D71000-memory.dmp

      Filesize

      4KB

    • memory/2652-9-0x00000000031D0000-0x00000000031D1000-memory.dmp

      Filesize

      4KB

    • memory/2652-3-0x0000000000B20000-0x0000000000B21000-memory.dmp

      Filesize

      4KB

    • memory/2652-26-0x0000000000D60000-0x0000000000D61000-memory.dmp

      Filesize

      4KB

    • memory/2652-24-0x0000000000D90000-0x0000000000D91000-memory.dmp

      Filesize

      4KB

    • memory/2652-23-0x0000000000DB0000-0x0000000000DB1000-memory.dmp

      Filesize

      4KB

    • memory/2652-22-0x0000000000BC0000-0x0000000000BC1000-memory.dmp

      Filesize

      4KB

    • memory/2652-21-0x0000000000D40000-0x0000000000D41000-memory.dmp

      Filesize

      4KB

    • memory/2652-0-0x0000000001000000-0x0000000001110000-memory.dmp

      Filesize

      1.1MB

    • memory/2652-19-0x0000000000D20000-0x0000000000D21000-memory.dmp

      Filesize

      4KB

    • memory/2652-40-0x0000000000720000-0x0000000000774000-memory.dmp

      Filesize

      336KB

    • memory/2652-8-0x0000000000B50000-0x0000000000B51000-memory.dmp

      Filesize

      4KB

    • memory/2652-17-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

      Filesize

      4KB

    • memory/2652-2-0x0000000000B40000-0x0000000000B41000-memory.dmp

      Filesize

      4KB

    • memory/2652-15-0x0000000000D30000-0x0000000000D31000-memory.dmp

      Filesize

      4KB

    • memory/2652-13-0x0000000000CE0000-0x0000000000CE1000-memory.dmp

      Filesize

      4KB

    • memory/2652-10-0x0000000000B80000-0x0000000000B81000-memory.dmp

      Filesize

      4KB

    • memory/2652-7-0x0000000000B60000-0x0000000000B61000-memory.dmp

      Filesize

      4KB

    • memory/2652-6-0x0000000000700000-0x0000000000701000-memory.dmp

      Filesize

      4KB

    • memory/2652-5-0x0000000000710000-0x0000000000711000-memory.dmp

      Filesize

      4KB

    • memory/2652-4-0x0000000000B70000-0x0000000000B71000-memory.dmp

      Filesize

      4KB

    • memory/2652-1-0x0000000000720000-0x0000000000774000-memory.dmp

      Filesize

      336KB

    • memory/2652-39-0x0000000001000000-0x0000000001110000-memory.dmp

      Filesize

      1.1MB

    • memory/2820-37-0x0000000000DD0000-0x0000000000DD1000-memory.dmp

      Filesize

      4KB

    • memory/2820-41-0x0000000000DD0000-0x0000000000DD1000-memory.dmp

      Filesize

      4KB

    • memory/4868-38-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/4868-32-0x0000000002390000-0x0000000002391000-memory.dmp

      Filesize

      4KB