Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
54d924192efc072a662385ae959afaf6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
54d924192efc072a662385ae959afaf6.exe
Resource
win10v2004-20231215-en
General
-
Target
54d924192efc072a662385ae959afaf6.exe
-
Size
700KB
-
MD5
54d924192efc072a662385ae959afaf6
-
SHA1
b27a02224b812f3086646950da0dbb18de2f8b25
-
SHA256
cc18e7fbd8e51a693f5ad58ecf066e0b5a070714b0bba1999fb71f10faa99699
-
SHA512
9187021c613b3a142e1aceea2741143605cddebb03a61a85c5c29bc518ab442ba2d0734e8946a86da261cb7a3c18f2e16a3de594bcef2ff9a1e702c61b5eb122
-
SSDEEP
12288:rtTYvl04iCM8NP3jOxZ3oHY4lF3Z4mxxkOceHA2QVCkh:ryvl0tCM8NP3SxZ3oHVQmXuey42
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\beep.sys 54d924192efc072a662385ae959afaf6.exe -
resource yara_rule behavioral2/files/0x00080000000231ea-14.dat aspack_v212_v242 -
Loads dropped DLL 1 IoCs
pid Process 2600 54d924192efc072a662385ae959afaf6.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\NetNtEx.dll 54d924192efc072a662385ae959afaf6.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2600 54d924192efc072a662385ae959afaf6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2600 wrote to memory of 2624 2600 54d924192efc072a662385ae959afaf6.exe 18 PID 2600 wrote to memory of 2624 2600 54d924192efc072a662385ae959afaf6.exe 18 PID 2600 wrote to memory of 2624 2600 54d924192efc072a662385ae959afaf6.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\54d924192efc072a662385ae959afaf6.exe"C:\Users\Admin\AppData\Local\Temp\54d924192efc072a662385ae959afaf6.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\54D924~1.EXE > nul2⤵PID:2624
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5add4841e688c1e99e8d4a942fa948de7
SHA1bdd725773b4e21c14364bbc597c7cea9477e91c1
SHA256eb27db167c08f09005ed0158f439d94bcd9d854fc290a2a9d38a8eaca8bbd065
SHA51264d0674116ae9dd2d1742e79fd3ab7335e62496619d9fdeba50110b87ee5822b7dd02c815017e51f0bb8bc02b09d4224bb93ae65fbac8cfd3ba6956a92e08d52