Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 17:43
Static task
static1
Behavioral task
behavioral1
Sample
5718181bfb54486fb2d81adccadfaf0b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5718181bfb54486fb2d81adccadfaf0b.exe
Resource
win10v2004-20231215-en
General
-
Target
5718181bfb54486fb2d81adccadfaf0b.exe
-
Size
52KB
-
MD5
5718181bfb54486fb2d81adccadfaf0b
-
SHA1
ac5d3b01fa0bb3a51cf79ee3b34b084d50681155
-
SHA256
85579d6b414f97cf00c56de714fd246d86713d5fbcdaaf876c75d149c2a85702
-
SHA512
f92d37141154ca89c98c0a39a4c3c1297f742312e59235e88918ea66b4abbb3b51341eb973b51cd81382c800136a2390befcb14e77025c8924d3214d6764300b
-
SSDEEP
1536:hmdPf5yVtFsERanqZ8rO6W8IJR7aZRwIQIaLpDXDe:hm952cU8ZW8c7CRwHHlDTe
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\beep.sys 5718181bfb54486fb2d81adccadfaf0b.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MediaCeasdnter\Parameters\ServiceDll = "C:\\Windows\\system32\\NetNtEx.dll" 5718181bfb54486fb2d81adccadfaf0b.exe -
Loads dropped DLL 2 IoCs
pid Process 4712 5718181bfb54486fb2d81adccadfaf0b.exe 3684 svchost.exe -
resource yara_rule behavioral2/files/0x0007000000023214-6.dat vmprotect -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\NetNtEx.dll 5718181bfb54486fb2d81adccadfaf0b.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4712 5718181bfb54486fb2d81adccadfaf0b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4712 wrote to memory of 824 4712 5718181bfb54486fb2d81adccadfaf0b.exe 91 PID 4712 wrote to memory of 824 4712 5718181bfb54486fb2d81adccadfaf0b.exe 91 PID 4712 wrote to memory of 824 4712 5718181bfb54486fb2d81adccadfaf0b.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5718181bfb54486fb2d81adccadfaf0b.exe"C:\Users\Admin\AppData\Local\Temp\5718181bfb54486fb2d81adccadfaf0b.exe"1⤵
- Drops file in Drivers directory
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\571818~1.EXE > nul2⤵PID:824
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵PID:3088
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k krnlsrvc1⤵
- Loads dropped DLL
PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD534cd55087a743507c440f937237c9b6a
SHA1fdf7db5bb55ee2f2cd3ff80a36a626fc2f799451
SHA2563ef31cb608e7ec51e631a4f689c005c89f60d0a4b3592c02b2de33c4ac589581
SHA512ca8b62c3ff904e789739de646db49c722765ba10c7d36aa6de9a496bec837cb8a8ac7b0c1c615994d77267d99d11501eb370c16368a8644e6ea6c7bfebe75127