Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 14:15
Static task
static1
Behavioral task
behavioral1
Sample
53bc4d0f4ebd4e0e32d145bd884755f3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53bc4d0f4ebd4e0e32d145bd884755f3.exe
Resource
win10v2004-20231222-en
General
-
Target
53bc4d0f4ebd4e0e32d145bd884755f3.exe
-
Size
359KB
-
MD5
53bc4d0f4ebd4e0e32d145bd884755f3
-
SHA1
f5b6944402afe901fc9347b6e61d0ab87ac84903
-
SHA256
412792f9cfb8d675ed37d78c6f088c15518ddc0a81895ca672a518c5cd31b5b0
-
SHA512
76d9c9f578d7e3646c6f5238b61611230f4c88f4d6a360ba1aa3ac0917f3aacf50e553b124c4a8f6420b04a1b9d878a22b735bd07709f671b840e84f8e78bab8
-
SSDEEP
6144:SqmkXfILgM2u+nmzK6QgSuHL5vj6pNyAxrcxnE1CQcYI8+yXObxKqG9sK5RY:Sqm4fIEGpzK6FSkFvzAeF0CxYgdbh+RY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1940 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rsaauto.bak 53bc4d0f4ebd4e0e32d145bd884755f3.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\systom32\ 53bc4d0f4ebd4e0e32d145bd884755f3.exe File created C:\Windows\systom32\schrars.exe 53bc4d0f4ebd4e0e32d145bd884755f3.exe File opened for modification C:\Windows\systom32\schrars.exe 53bc4d0f4ebd4e0e32d145bd884755f3.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeRestorePrivilege 2312 53bc4d0f4ebd4e0e32d145bd884755f3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1940 2312 53bc4d0f4ebd4e0e32d145bd884755f3.exe 28 PID 2312 wrote to memory of 1940 2312 53bc4d0f4ebd4e0e32d145bd884755f3.exe 28 PID 2312 wrote to memory of 1940 2312 53bc4d0f4ebd4e0e32d145bd884755f3.exe 28 PID 2312 wrote to memory of 1940 2312 53bc4d0f4ebd4e0e32d145bd884755f3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\53bc4d0f4ebd4e0e32d145bd884755f3.exe"C:\Users\Admin\AppData\Local\Temp\53bc4d0f4ebd4e0e32d145bd884755f3.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\cmd.execmd /c afc9fe2f418b00a0.bat2⤵
- Deletes itself
PID:1940
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD529f7666d85e6af44f55297359ffc0c0c
SHA15d3a809da42518aa62cd8c3d32dddce8487eb591
SHA2564e9bb0075e15c840d9eb3feed302e174c5f09646d9ba6723a09882219396eb11
SHA512826b6831e394eba83b330739f747153f6a3d6839801c1789a7ba8c69802436dc06fa971f6f013f41c21f78b5979e78fc5094c8e6abda605e49d2979eee237f6f