Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
520fa37348fe651f69f1f7d54035e35a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
520fa37348fe651f69f1f7d54035e35a.exe
Resource
win10v2004-20231215-en
General
-
Target
520fa37348fe651f69f1f7d54035e35a.exe
-
Size
261KB
-
MD5
520fa37348fe651f69f1f7d54035e35a
-
SHA1
3db5f3519beb5a82f133e0b74dca10acd6ecce02
-
SHA256
1749c34786f941abb1668beeae34c3efd6c0b226cd7675b6e97c1d607697e76a
-
SHA512
cec65ab89fd67d88ad5fd95c29509e684ce44f3d804c55ad4c2aecce4d0302694edb899acef4631f814c509d789117c1395632f82baa9d78ead870eb3620fe6d
-
SSDEEP
6144:Vh9Z0zk97eZyPR2PpJtlQYnmxPr2cDOlLY:Vh9Z6quyp2Gz/sY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2204 mstosys.bat -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\mstosys.bat 520fa37348fe651f69f1f7d54035e35a.exe File opened for modification C:\Windows\mstosys.bat 520fa37348fe651f69f1f7d54035e35a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2324 520fa37348fe651f69f1f7d54035e35a.exe Token: SeDebugPrivilege 2204 mstosys.bat -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2204 mstosys.bat
Processes
-
C:\Users\Admin\AppData\Local\Temp\520fa37348fe651f69f1f7d54035e35a.exe"C:\Users\Admin\AppData\Local\Temp\520fa37348fe651f69f1f7d54035e35a.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
C:\Windows\mstosys.batC:\Windows\mstosys.bat1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2204
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD5520fa37348fe651f69f1f7d54035e35a
SHA13db5f3519beb5a82f133e0b74dca10acd6ecce02
SHA2561749c34786f941abb1668beeae34c3efd6c0b226cd7675b6e97c1d607697e76a
SHA512cec65ab89fd67d88ad5fd95c29509e684ce44f3d804c55ad4c2aecce4d0302694edb899acef4631f814c509d789117c1395632f82baa9d78ead870eb3620fe6d