Analysis
-
max time kernel
144s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 12:44
Behavioral task
behavioral1
Sample
ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d.exe
Resource
win10v2004-20231215-en
General
-
Target
ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d.exe
-
Size
274KB
-
MD5
b378427f6b2291fd0466d79eb5ad15dd
-
SHA1
be45d7b35a6a537807ab98dac827b0fcae11bf29
-
SHA256
ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d
-
SHA512
4fa7ae38420b68954c2ec7028925bc6c648f0b6b91ad62e51e34b49e4ed419e6a1e44547827fb178f3a12b8a0ca2f2c05d572e21b28730adb89d31061ee16842
-
SSDEEP
6144:vbTirrfykiiUjh6QH/cEOkCybEaQRXr9HNdvOa:vPcrfR6ZnOkx2LIa
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/416-0-0x0000000000FA0000-0x000000000102C000-memory.dmp upx behavioral2/memory/416-3-0x0000000000FA0000-0x000000000102C000-memory.dmp upx behavioral2/memory/416-17-0x0000000000FA0000-0x000000000102C000-memory.dmp upx behavioral2/memory/416-20-0x0000000000FA0000-0x000000000102C000-memory.dmp upx behavioral2/memory/416-25-0x0000000000FA0000-0x000000000102C000-memory.dmp upx behavioral2/memory/416-27-0x0000000000FA0000-0x000000000102C000-memory.dmp upx -
Unexpected DNS network traffic destination 7 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 114.114.114.114 Destination IP 223.5.5.5 Destination IP 114.114.114.114 Destination IP 223.5.5.5 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\err_416.log ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 416 ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d.exe 416 ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d.exe 416 ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d.exe 416 ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d.exe 416 ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d.exe 416 ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 416 ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d.exe Token: SeTcbPrivilege 416 ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d.exe"C:\Users\Admin\AppData\Local\Temp\ea1c4344176f783ee21fc3bb579b67bf4685cd56a2d3d68495f9a356e292ea7d.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:416