Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 12:10
Behavioral task
behavioral1
Sample
6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe
Resource
win10v2004-20231215-en
General
-
Target
6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe
-
Size
830KB
-
MD5
6cfdcf0ba8097fea9fd2e219663e0f39
-
SHA1
15598aab7c4f668ff191a764a2fe0054ff27c31e
-
SHA256
6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa
-
SHA512
c187db1da68f04456594a92f36093517bb45b0a48c125faa089a8e39b2773ea89b38c9e01a0f5645bedb12d33cac6163f1b301d620725a0b2b7ec26fa61ee427
-
SSDEEP
12288:ZEmC92VnpahSR7BwkASR49lkQHMIWnDp2f47z4PUUhyVb4yDKUgM03qcmT1Pd2Kk:ZEF96C6BwkP2lsl8fEQemdM03zmT1P6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2704 cmd.exe -
resource yara_rule behavioral1/memory/2900-0-0x0000000001000000-0x000000000113C000-memory.dmp upx behavioral1/memory/2900-41-0x0000000001000000-0x000000000113C000-memory.dmp upx behavioral1/memory/2900-43-0x0000000001000000-0x000000000113C000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\WindowsShell2330785.log 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe File opened for modification C:\Windows\WindowSystemNewUpdate116.log PING.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2136 2848 WerFault.exe 15 -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2832 PING.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe Token: SeDebugPrivilege 2832 PING.EXE Token: SeIncBasePriorityPrivilege 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2848 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 15 PID 2900 wrote to memory of 2848 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 15 PID 2900 wrote to memory of 2848 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 15 PID 2900 wrote to memory of 2848 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 15 PID 2900 wrote to memory of 2848 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 15 PID 2900 wrote to memory of 2848 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 15 PID 2900 wrote to memory of 2848 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 15 PID 2848 wrote to memory of 2136 2848 grpconv.exe 16 PID 2848 wrote to memory of 2136 2848 grpconv.exe 16 PID 2848 wrote to memory of 2136 2848 grpconv.exe 16 PID 2848 wrote to memory of 2136 2848 grpconv.exe 16 PID 2900 wrote to memory of 2832 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 30 PID 2900 wrote to memory of 2832 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 30 PID 2900 wrote to memory of 2832 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 30 PID 2900 wrote to memory of 2832 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 30 PID 2900 wrote to memory of 2832 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 30 PID 2900 wrote to memory of 2832 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 30 PID 2900 wrote to memory of 2832 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 30 PID 2900 wrote to memory of 2704 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 32 PID 2900 wrote to memory of 2704 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 32 PID 2900 wrote to memory of 2704 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 32 PID 2900 wrote to memory of 2704 2900 6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe"C:\Users\Admin\AppData\Local\Temp\6355710cb94f6594d3a727f009dd3ac176bcad8e04cd5b4fab1d5071d3cf45fa.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\grpconv.exe"C:\Windows\SysWOW64\grpconv.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2848 -s 1683⤵
- Program crash
PID:2136
-
-
-
C:\Windows\SysWOW64\PING.EXE"C:\Windows\SysWOW64\PING.EXE"2⤵
- Drops file in Windows directory
- Runs ping.exe
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\635571~1.EXE > nul2⤵
- Deletes itself
PID:2704
-