Analysis
-
max time kernel
154s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
4c81806e223c8b1ba210caf449c964ad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c81806e223c8b1ba210caf449c964ad.exe
Resource
win10v2004-20231215-en
General
-
Target
4c81806e223c8b1ba210caf449c964ad.exe
-
Size
315KB
-
MD5
4c81806e223c8b1ba210caf449c964ad
-
SHA1
4fc52505d433fe5f7926fd53d81da8fae7864add
-
SHA256
77bc94ec6b1203ccd3dd46b344d8b95de8436e1a0d768d4c3c08e294c9b38a8f
-
SHA512
e4b5ade0838a88c42043f860258bd2d24cd0bfdda45615246e12ccad95c683dfdc46ccd5b9cac1be268075cdeca6dd5369586a9b428307e031e464b57ea068db
-
SSDEEP
6144:sPK1/SWKm+UuBuA5Xg/RzjK7Wgx1i4+pRwqImqQAz/6tzBLjAEVpH5CjKRRsVjCi:E3yI42XsVj01iB8YLpH4KRRs5C3S
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2908 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2752 Clsivl.bat -
Loads dropped DLL 4 IoCs
pid Process 1304 4c81806e223c8b1ba210caf449c964ad.exe 1304 4c81806e223c8b1ba210caf449c964ad.exe 2668 WerFault.exe 2668 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Deleteme.bat 4c81806e223c8b1ba210caf449c964ad.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\Clsivl.bat 4c81806e223c8b1ba210caf449c964ad.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\Clsivl.bat 4c81806e223c8b1ba210caf449c964ad.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2668 2752 WerFault.exe 28 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 1304 4c81806e223c8b1ba210caf449c964ad.exe Token: SeSystemtimePrivilege 1304 4c81806e223c8b1ba210caf449c964ad.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2752 1304 4c81806e223c8b1ba210caf449c964ad.exe 28 PID 1304 wrote to memory of 2752 1304 4c81806e223c8b1ba210caf449c964ad.exe 28 PID 1304 wrote to memory of 2752 1304 4c81806e223c8b1ba210caf449c964ad.exe 28 PID 1304 wrote to memory of 2752 1304 4c81806e223c8b1ba210caf449c964ad.exe 28 PID 2752 wrote to memory of 2668 2752 Clsivl.bat 29 PID 2752 wrote to memory of 2668 2752 Clsivl.bat 29 PID 2752 wrote to memory of 2668 2752 Clsivl.bat 29 PID 2752 wrote to memory of 2668 2752 Clsivl.bat 29 PID 1304 wrote to memory of 2908 1304 4c81806e223c8b1ba210caf449c964ad.exe 32 PID 1304 wrote to memory of 2908 1304 4c81806e223c8b1ba210caf449c964ad.exe 32 PID 1304 wrote to memory of 2908 1304 4c81806e223c8b1ba210caf449c964ad.exe 32 PID 1304 wrote to memory of 2908 1304 4c81806e223c8b1ba210caf449c964ad.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c81806e223c8b1ba210caf449c964ad.exe"C:\Users\Admin\AppData\Local\Temp\4c81806e223c8b1ba210caf449c964ad.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\Clsivl.bat"C:\Program Files\Common Files\Microsoft Shared\MSInfo\Clsivl.bat"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 2763⤵
- Loads dropped DLL
- Program crash
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Deleteme.bat2⤵
- Deletes itself
PID:2908
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5983560ee5ed1a0e2bc095ecf6434e015
SHA1af6376a54181fb971653f456c878316b9c8c5227
SHA2565e06e3917e301d2f68bb2ffa016810d32c0618985320cc7ae9d2d9ef32e8936b
SHA5127d038fa9295d36e7047caa7f23088c129e91fca44752aafb1222acd34db70de9782750cd153fb586529fccee16f2456c4201936ecaa70bb87334f3c999f7a950
-
Filesize
315KB
MD54c81806e223c8b1ba210caf449c964ad
SHA14fc52505d433fe5f7926fd53d81da8fae7864add
SHA25677bc94ec6b1203ccd3dd46b344d8b95de8436e1a0d768d4c3c08e294c9b38a8f
SHA512e4b5ade0838a88c42043f860258bd2d24cd0bfdda45615246e12ccad95c683dfdc46ccd5b9cac1be268075cdeca6dd5369586a9b428307e031e464b57ea068db