Analysis
-
max time kernel
156s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
4c81806e223c8b1ba210caf449c964ad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4c81806e223c8b1ba210caf449c964ad.exe
Resource
win10v2004-20231215-en
General
-
Target
4c81806e223c8b1ba210caf449c964ad.exe
-
Size
315KB
-
MD5
4c81806e223c8b1ba210caf449c964ad
-
SHA1
4fc52505d433fe5f7926fd53d81da8fae7864add
-
SHA256
77bc94ec6b1203ccd3dd46b344d8b95de8436e1a0d768d4c3c08e294c9b38a8f
-
SHA512
e4b5ade0838a88c42043f860258bd2d24cd0bfdda45615246e12ccad95c683dfdc46ccd5b9cac1be268075cdeca6dd5369586a9b428307e031e464b57ea068db
-
SSDEEP
6144:sPK1/SWKm+UuBuA5Xg/RzjK7Wgx1i4+pRwqImqQAz/6tzBLjAEVpH5CjKRRsVjCi:E3yI42XsVj01iB8YLpH4KRRs5C3S
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1632 Clsivl.bat -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Deleteme.bat 4c81806e223c8b1ba210caf449c964ad.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\Clsivl.bat 4c81806e223c8b1ba210caf449c964ad.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\Clsivl.bat 4c81806e223c8b1ba210caf449c964ad.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 4904 4c81806e223c8b1ba210caf449c964ad.exe Token: SeSystemtimePrivilege 4904 4c81806e223c8b1ba210caf449c964ad.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4904 wrote to memory of 1632 4904 4c81806e223c8b1ba210caf449c964ad.exe 94 PID 4904 wrote to memory of 1632 4904 4c81806e223c8b1ba210caf449c964ad.exe 94 PID 4904 wrote to memory of 1632 4904 4c81806e223c8b1ba210caf449c964ad.exe 94 PID 1632 wrote to memory of 1592 1632 Clsivl.bat 95 PID 1632 wrote to memory of 1592 1632 Clsivl.bat 95 PID 4904 wrote to memory of 4564 4904 4c81806e223c8b1ba210caf449c964ad.exe 96 PID 4904 wrote to memory of 4564 4904 4c81806e223c8b1ba210caf449c964ad.exe 96 PID 4904 wrote to memory of 4564 4904 4c81806e223c8b1ba210caf449c964ad.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c81806e223c8b1ba210caf449c964ad.exe"C:\Users\Admin\AppData\Local\Temp\4c81806e223c8b1ba210caf449c964ad.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\Clsivl.bat"C:\Program Files\Common Files\Microsoft Shared\MSInfo\Clsivl.bat"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat2⤵PID:4564
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315KB
MD54c81806e223c8b1ba210caf449c964ad
SHA14fc52505d433fe5f7926fd53d81da8fae7864add
SHA25677bc94ec6b1203ccd3dd46b344d8b95de8436e1a0d768d4c3c08e294c9b38a8f
SHA512e4b5ade0838a88c42043f860258bd2d24cd0bfdda45615246e12ccad95c683dfdc46ccd5b9cac1be268075cdeca6dd5369586a9b428307e031e464b57ea068db
-
Filesize
184B
MD5983560ee5ed1a0e2bc095ecf6434e015
SHA1af6376a54181fb971653f456c878316b9c8c5227
SHA2565e06e3917e301d2f68bb2ffa016810d32c0618985320cc7ae9d2d9ef32e8936b
SHA5127d038fa9295d36e7047caa7f23088c129e91fca44752aafb1222acd34db70de9782750cd153fb586529fccee16f2456c4201936ecaa70bb87334f3c999f7a950