Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 17:42
Behavioral task
behavioral1
Sample
fight.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fight.exe
Resource
win10v2004-20231222-en
General
-
Target
fight.exe
-
Size
7.2MB
-
MD5
6591fefcbed30d5b1d07004911b42f3e
-
SHA1
265cb9668a746293dfc4156005d3865728966564
-
SHA256
66e8cd483fecac0f1cb9ab74cad35ae7c4993b7621c5afedf55801796d1706fc
-
SHA512
41f908619deddbcd5d4d4708db1e8dace048f1340d542c0c2677aa62fc030e44038a2addacaf8900102bd95aefad95d3435360d056db5a18d7fee82a59f51798
-
SSDEEP
196608:xSoP1HdXfZ8bnti7tbYPvbJQlHHbTvN8CbpYC:rP1JR8JCkJQlbTjL
Malware Config
Signatures
-
Loads dropped DLL 14 IoCs
pid Process 1904 fight.exe 1904 fight.exe 1904 fight.exe 1904 fight.exe 1904 fight.exe 1904 fight.exe 1904 fight.exe 1904 fight.exe 1904 fight.exe 1904 fight.exe 1904 fight.exe 1904 fight.exe 1904 fight.exe 1904 fight.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: 35 1904 fight.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4524 wrote to memory of 1904 4524 fight.exe 38 PID 4524 wrote to memory of 1904 4524 fight.exe 38 PID 4524 wrote to memory of 1904 4524 fight.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\fight.exe"C:\Users\Admin\AppData\Local\Temp\fight.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\fight.exe"C:\Users\Admin\AppData\Local\Temp\fight.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5aeab74db6bc6c914997f1a8a9ff013ec
SHA16b717f23227d158d6aa566498c438b8f305a29b5
SHA25618ccb2dd8af853f4e6221bb5513e3154ef67ae61cee6ec319a8a97615987dc4b
SHA512a2832b7720599361e2537f79a2597acb1a2d5633fdfe20a0d1075e9457683fdb1d5676d121c0bf1a825ff99512dcd924254f1151b50aae922acc0cc10f461036
-
Filesize
92KB
MD51029ed0b1620cdee67df93ed36ba2617
SHA16e33b19b91613184f955272f2052dec46be9909c
SHA2565482b5fcb9617034229f95149f0bd06328f6aaf72d5def87647892b7a5ad4706
SHA512c9bfd94924f503be0044e3b323b593746a9cfa001769851087968cbc554e031b66df627e180b017d9f8a2f40ee5136002fea811db30df42d8452f9db633d6bf2