Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
4cd0724e4d8d60919fb0154f538a18d7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4cd0724e4d8d60919fb0154f538a18d7.exe
Resource
win10v2004-20231215-en
General
-
Target
4cd0724e4d8d60919fb0154f538a18d7.exe
-
Size
18KB
-
MD5
4cd0724e4d8d60919fb0154f538a18d7
-
SHA1
07f4e2b8cca20a8a0008ae5fd650e263b9970535
-
SHA256
1db59f9bcc49d198741393c0d71c73389f145f75e8524b94cadcdb518128d18b
-
SHA512
b402dd2a713aaeee59f1810a6b48440227cd17b6cb84e92d407c6f2fa18e7ab12d3b6cf6488d666c9a9aa9f5a1f6973b85b493a162998cad50b3d2d6abd11cb1
-
SSDEEP
384:27jujHLZaoVNbPhr/XSmG3Bgok9KjOip:B3h5XSmG3RuIOip
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4704 mppds.exe -
Executes dropped EXE 1 IoCs
pid Process 4704 mppds.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mppds = "C:\\Windows\\mppds.exe" mppds.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\mppds.dll mppds.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\mppds.exe 4cd0724e4d8d60919fb0154f538a18d7.exe File opened for modification C:\Windows\mppds.exe 4cd0724e4d8d60919fb0154f538a18d7.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4704 mppds.exe 4704 mppds.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 680 4cd0724e4d8d60919fb0154f538a18d7.exe Token: SeDebugPrivilege 4704 mppds.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 680 wrote to memory of 4704 680 4cd0724e4d8d60919fb0154f538a18d7.exe 33 PID 680 wrote to memory of 4704 680 4cd0724e4d8d60919fb0154f538a18d7.exe 33 PID 680 wrote to memory of 4704 680 4cd0724e4d8d60919fb0154f538a18d7.exe 33 PID 4704 wrote to memory of 3420 4704 mppds.exe 50 PID 4704 wrote to memory of 3420 4704 mppds.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cd0724e4d8d60919fb0154f538a18d7.exe"C:\Users\Admin\AppData\Local\Temp\4cd0724e4d8d60919fb0154f538a18d7.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\mppds.exeC:\Windows\mppds.exe @C:\Users\Admin\AppData\Local\Temp\4cd0724e4d8d60919fb0154f538a18d7.exe@6802⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4704
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD54cd0724e4d8d60919fb0154f538a18d7
SHA107f4e2b8cca20a8a0008ae5fd650e263b9970535
SHA2561db59f9bcc49d198741393c0d71c73389f145f75e8524b94cadcdb518128d18b
SHA512b402dd2a713aaeee59f1810a6b48440227cd17b6cb84e92d407c6f2fa18e7ab12d3b6cf6488d666c9a9aa9f5a1f6973b85b493a162998cad50b3d2d6abd11cb1