Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
514990d00a1a63b03c3fde33690a866a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
514990d00a1a63b03c3fde33690a866a.exe
Resource
win10v2004-20231215-en
General
-
Target
514990d00a1a63b03c3fde33690a866a.exe
-
Size
56KB
-
MD5
514990d00a1a63b03c3fde33690a866a
-
SHA1
10fdcc35d04969f255d8471a475ac495dca767f0
-
SHA256
93be92d273232fc93576317906e3e1c2232c52fa80f14cbf8cf9842bfb8c6fa3
-
SHA512
5f5c492d1daaf10ec0c797649a748c0b0400117da625721dfa2d222469244df8f5f8cb339eaf96d8e807f6d2ba0e8cc822058b83669f74f4b722a61e7f029fc2
-
SSDEEP
1536:nyZMSZFvknTePMZd4k4kJJ/V0GCxBFQVy8uo2ODZQg4U:yZMJnTeM4cJJ/V05fFZ8COFQg
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3016 514990d00a1a63b03c3fde33690a866a.exe 3016 514990d00a1a63b03c3fde33690a866a.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe File created C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 3016 514990d00a1a63b03c3fde33690a866a.exe Token: SeBackupPrivilege 3016 514990d00a1a63b03c3fde33690a866a.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2056 3016 514990d00a1a63b03c3fde33690a866a.exe 28 PID 3016 wrote to memory of 2056 3016 514990d00a1a63b03c3fde33690a866a.exe 28 PID 3016 wrote to memory of 2056 3016 514990d00a1a63b03c3fde33690a866a.exe 28 PID 3016 wrote to memory of 2056 3016 514990d00a1a63b03c3fde33690a866a.exe 28 PID 3016 wrote to memory of 2056 3016 514990d00a1a63b03c3fde33690a866a.exe 28 PID 3016 wrote to memory of 2056 3016 514990d00a1a63b03c3fde33690a866a.exe 28 PID 3016 wrote to memory of 2056 3016 514990d00a1a63b03c3fde33690a866a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\514990d00a1a63b03c3fde33690a866a.exe"C:\Users\Admin\AppData\Local\Temp\514990d00a1a63b03c3fde33690a866a.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\cmd.execmd.exe /c copy C:\Users\Admin\AppData\Local\Temp\ife.txt "C:\PROGRA~1\INTERN~1\ieframe.dll" /a2⤵
- Drops file in Program Files directory
PID:2056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5bc5b43b8f2fd330b1fcd99ccbb651bcd
SHA1ff4f40b1f41e486499e014c8252afe53cff73114
SHA25602c631b25cbefed3b68a233881fc52214cbbf453746ae4104939632c14ca2e00
SHA51245d4c95b06c4c652fd196066dd9eb67b573ed1b91290dab416b769b40cc552b05a170bf4c470e0dc466e63bb8dfe2388a4f01ec55fac4f493625a03ca951d44e
-
Filesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53