Analysis
-
max time kernel
7s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 19:41
Behavioral task
behavioral1
Sample
57567da333edefd06dc068c8852ea22d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57567da333edefd06dc068c8852ea22d.exe
Resource
win10v2004-20231222-en
General
-
Target
57567da333edefd06dc068c8852ea22d.exe
-
Size
188KB
-
MD5
57567da333edefd06dc068c8852ea22d
-
SHA1
ab61bd29f548e5f529a22685a62325c983df4feb
-
SHA256
e08b93e5e31665dfdfb0f51386c0b4dc21d6a87bf732e0076ff66e0693170869
-
SHA512
5e335d60778ff73d2864e8ee22de22851db4f9baafe7566911607e19c5641f5643543ae660f5fcbfaae5a63ebc405d3197e633dfef694a5e996fbbf1ceb97d6f
-
SSDEEP
3072:JlwE1v6dyY3R+/MOS0XM8DxYmLmwFg+0LK5vAYVUQKMnoZmOpC64UjAFDldu4S6r:7wtTk/HbKwFg+/5vDUcUX/sFx4h6HUpU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2348 saazm.exe -
Loads dropped DLL 2 IoCs
pid Process 1428 57567da333edefd06dc068c8852ea22d.exe 1428 57567da333edefd06dc068c8852ea22d.exe -
resource yara_rule behavioral1/memory/1428-0-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/files/0x000b00000001508a-14.dat upx behavioral1/files/0x000b00000001508a-7.dat upx behavioral1/files/0x000b00000001508a-5.dat upx -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Privacy 57567da333edefd06dc068c8852ea22d.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 57567da333edefd06dc068c8852ea22d.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2348 saazm.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1428 57567da333edefd06dc068c8852ea22d.exe Token: SeSecurityPrivilege 1428 57567da333edefd06dc068c8852ea22d.exe Token: SeSecurityPrivilege 1428 57567da333edefd06dc068c8852ea22d.exe Token: SeManageVolumePrivilege 1232 WinMail.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1232 WinMail.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1428 wrote to memory of 2348 1428 57567da333edefd06dc068c8852ea22d.exe 29 PID 1428 wrote to memory of 2348 1428 57567da333edefd06dc068c8852ea22d.exe 29 PID 1428 wrote to memory of 2348 1428 57567da333edefd06dc068c8852ea22d.exe 29 PID 1428 wrote to memory of 2348 1428 57567da333edefd06dc068c8852ea22d.exe 29 PID 2348 wrote to memory of 1096 2348 saazm.exe 18 PID 2348 wrote to memory of 1096 2348 saazm.exe 18 PID 2348 wrote to memory of 1096 2348 saazm.exe 18 PID 2348 wrote to memory of 1096 2348 saazm.exe 18 PID 2348 wrote to memory of 1096 2348 saazm.exe 18 PID 2348 wrote to memory of 1160 2348 saazm.exe 10 PID 2348 wrote to memory of 1160 2348 saazm.exe 10 PID 2348 wrote to memory of 1160 2348 saazm.exe 10 PID 2348 wrote to memory of 1160 2348 saazm.exe 10 PID 2348 wrote to memory of 1160 2348 saazm.exe 10 PID 2348 wrote to memory of 1184 2348 saazm.exe 17 PID 2348 wrote to memory of 1184 2348 saazm.exe 17 PID 2348 wrote to memory of 1184 2348 saazm.exe 17 PID 2348 wrote to memory of 1184 2348 saazm.exe 17 PID 2348 wrote to memory of 1184 2348 saazm.exe 17 PID 2348 wrote to memory of 2196 2348 saazm.exe 15 PID 2348 wrote to memory of 2196 2348 saazm.exe 15 PID 2348 wrote to memory of 2196 2348 saazm.exe 15 PID 2348 wrote to memory of 2196 2348 saazm.exe 15 PID 2348 wrote to memory of 2196 2348 saazm.exe 15 PID 2348 wrote to memory of 1428 2348 saazm.exe 14 PID 2348 wrote to memory of 1428 2348 saazm.exe 14 PID 2348 wrote to memory of 1428 2348 saazm.exe 14 PID 2348 wrote to memory of 1428 2348 saazm.exe 14 PID 2348 wrote to memory of 1428 2348 saazm.exe 14
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\57567da333edefd06dc068c8852ea22d.exe"C:\Users\Admin\AppData\Local\Temp\57567da333edefd06dc068c8852ea22d.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Roaming\Esox\saazm.exe"C:\Users\Admin\AppData\Roaming\Esox\saazm.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpb9261d6f.bat"2⤵PID:1836
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2196
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1096
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5df5bc5744e82042a38f929621d6ddeb9
SHA17ce53c834da84c7dbc9460e7b78f9fd249c66b50
SHA2566d1624a1983f303d4012167358a57851ad9c20a5b9169d040039808b8ef0747c
SHA5128920e8117707360c43183c6df1b5fce1031d227d9af8e991c1ecdc4a9ce93f1e337afe56502cc376bb41948ccc47f355a682800f248d7de47985b3aa6747aebf
-
Filesize
157KB
MD5d3efac56d4d711b3f28cce51caf8a777
SHA1c466137cf15171cbb8dc2db51937717cfb7de71f
SHA25604206507eac723b1314b74876955bae018fe5428cb1047598e58cbfad0a4369f
SHA5123fc77c86f3eaffc9720859bb222f6ecf5fee2fc9afc9cacc5378d5df82cfdb8d0905f50b43eb9324580b17668de30cc3c0af53c8e5e03ce911d23d5d9818d7c7