Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
49d0e9c0f44585b86e8f7b593e99c802.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49d0e9c0f44585b86e8f7b593e99c802.exe
Resource
win10v2004-20231215-en
General
-
Target
49d0e9c0f44585b86e8f7b593e99c802.exe
-
Size
638KB
-
MD5
49d0e9c0f44585b86e8f7b593e99c802
-
SHA1
44a1779fa85c55f20a1498de71e3b3b047ec8db3
-
SHA256
70ab1fddd149d8ed04a0318df09d6434303810029d5dd7cd11ef6108e54d278f
-
SHA512
fa4e07883c568bb0b686d8c9e763a657857914107cd0ca62790dc7b2cf098d7dbdbcbc07ea30c4af6bb962ccea2d034966021b65363bbc00c61267803ae8ae95
-
SSDEEP
12288:szX8xULJkf2iM7rJ4syL+8DJzJ8WOkoI1FOdm1c2obY7poiLfKyf96ud63K:sAWLxd4syLtDkWmI1FOdEocSohkuMK
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2108 4.exe 2844 Hacker.com.cn.exe -
Loads dropped DLL 2 IoCs
pid Process 1720 49d0e9c0f44585b86e8f7b593e99c802.exe 1720 49d0e9c0f44585b86e8f7b593e99c802.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49d0e9c0f44585b86e8f7b593e99c802.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe 4.exe File opened for modification C:\Windows\Hacker.com.cn.exe 4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2108 4.exe Token: SeDebugPrivilege 2844 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2844 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2108 1720 49d0e9c0f44585b86e8f7b593e99c802.exe 28 PID 1720 wrote to memory of 2108 1720 49d0e9c0f44585b86e8f7b593e99c802.exe 28 PID 1720 wrote to memory of 2108 1720 49d0e9c0f44585b86e8f7b593e99c802.exe 28 PID 1720 wrote to memory of 2108 1720 49d0e9c0f44585b86e8f7b593e99c802.exe 28 PID 2844 wrote to memory of 2704 2844 Hacker.com.cn.exe 30 PID 2844 wrote to memory of 2704 2844 Hacker.com.cn.exe 30 PID 2844 wrote to memory of 2704 2844 Hacker.com.cn.exe 30 PID 2844 wrote to memory of 2704 2844 Hacker.com.cn.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\49d0e9c0f44585b86e8f7b593e99c802.exe"C:\Users\Admin\AppData\Local\Temp\49d0e9c0f44585b86e8f7b593e99c802.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
787KB
MD5de560ab9c0078b51a784f39370a82420
SHA13492f27b19f28b04640699ae024bb122910522d6
SHA256ad1b06deedda023426d01da6c3c48454d02045d2d23825ce77f699edee671699
SHA51286183f468035b39279100b45ea9f1b317207dea15a73a61c0c881b748d3b3611a3b5057d1008a383cf93aed238dc6819ea4dfec11f8c3ba306ba4e9565cf2d2e
-
Filesize
704KB
MD5e444965ff1ee6f31ee5dd022d9d1ee4f
SHA1e3018638c5ceb4bd6e1dcc9b4da0a937add9b649
SHA256ad7fd674e83f9c63dade4df778adcd55344e76482f77083b318722d1517fb5c4
SHA5127f9e8fb80fefc7de6bdb047fe40e87cef0311e8d8fb3726b6c05257cf20c174738a9b1be578a399649ae526069a419283351fdb546f89d72190a353c52c21afb